DocumentCode :
940067
Title :
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security
Author :
Li, Qing ; Trappe, Wade
Author_Institution :
Wireless Inf. Network Lab. (WINLAB), Rutgers Univ., Piscataway, NJ, USA
Volume :
1
Issue :
2
fYear :
2006
fDate :
6/1/2006 12:00:00 AM
Firstpage :
190
Lastpage :
204
Abstract :
Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient stream loss-tolerant authentication (TESLA), a method for achieving multigrade authentication in multicast scenarios that reduces the delay needed to filter forged multicast packets and, consequently, mitigates the effects of DoS attacks. Staggered TESLA involves modifications to the popular multicast authentication scheme, TESLA, by incorporating the notion of multilevel trust through the use of multiple, staggered authentication keys in creating message authentication codes (MACs) for a multicast packet. We provide guidelines for determining the appropriate buffer size, and show that the use of multiple MACs and, hence, multiple grades of authentication, allows the receiver to flush forged packets quicker than in conventional TESLA. As a result, staggered TESLA provides an advantage against DoS attacks compared to conventional TESLA. We then examine two new strategies for reducing the time needed for complete authentication. In the first strategy, the multicast source uses assurance of the trustworthiness of entities in a neighborhood of the source, in conjunction with the multigrade authentication provided by staggered TESLA. The second strategy achieves reduced delay by introducing additional key distributors in the network.
Keywords :
message authentication; multicast communication; telecommunication security; telecommunication services; denial-of-service attacks; message authentication codes; multicast authentication; multigrade security; receiver-side buffers; staggered authentication keys; timed efficient stream loss-tolerant authentication; Added delay; Broadcasting; Communication system control; Computer crime; Delay effects; Filters; Guidelines; Message authentication; Queueing analysis; Security; Denial-of-service (DoS) attacks; forge-capable area; message authentication code (MAC); multigrade source authentication; queueing theory; timed efficient stream loss-tolerant authentication (TESLA); trust;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2006.873599
Filename :
1634361
Link To Document :
بازگشت