A source authentication and data confidentiality scheme based on TESLA protocol and XOR encryption for multicast

Authors

  • Abderrahim BENMACHICHE International Islamic University Malaysia
  • Salami Ali Department of Computer Science, Faculty of Computer Science and Information Technology, Shaqra University, Arabia Saudi.
  • Azeddine Messikh International Islamic University Malaysia

DOI:

https://doi.org/10.31436/ijpcc.v2i2.23

Abstract

The source authentication and data confidentiality are needed in many multicast applications. Most of researches that have been done, attempt to solve just one aspect whether the source authentication or the confidentiality of data. In this paper, we aim to propose a scheme that can treat the two problems together. Our scheme stands on TESLA protocol to ensure the source authentication and the XOR encryption to ensure the confidentiality of the transmitted information. The result is this scheme can be applied on low bandwidth application and it does not require high computation devices whether in the source or in the receivers’ side. Furthermore, it tolerates to packet loss. According to the aforementioned advantages, the proposed scheme is secure from the both sides (authentication and confidentiality) moreover it does not cost much.

Author Biographies

Abderrahim BENMACHICHE, International Islamic University Malaysia

department of Computer Science

Azeddine Messikh, International Islamic University Malaysia

department of computer science

References

[1] R. Canetti, J. Garayt, G. Itkid, D. Micciancios, M. Naore, and B. Pinkasll, “Multicast Security: A Taxonomy and Efficient Constructions,”, INFOCOM, 1999.

[2] T. Hardjono and G. Tsudik, “IP multicast security: Issues and directions,” Annales de Telecom., 2000.

[3] Y. Challal, H. Bettahar, and A. Bouabdallah, “A taxonomy of multicast data origin authentication: Issues and solutions,” IEEE Commun. Surv. Tutorials, vol. 6, pp. 34-57, 2004.

[4] A. Perrigy, R. Canettiz, J. Tygary, and D. Songy, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” IEEE Symp. Security and Privacy, 2000.

[5] A. Perrig, R. Canetti, J. Tygar, and D. Song, “The TESLA Broadcast Authentication Protocol,” RSA CryptoBytes, vol. 5, 2002.

[6] L. Lamport, “Password authentication with insecure communication.” Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.

[7] N. Haller, “The S/Key™ One-time Password System,” ISOC Symp. Network and Distributed Security. Rep. 99-02, 1994.

[8] F. Bergadano, D. Cavagnino and B. Crispo, “Individual Single- Source Authentication on the Mbone,” IEEE Int’l. Conf. Multimedia and Expo,2000.

[9] M. Reiter, “A security architecture for fault-tolerant systems,” Ph.D Cornell University, 1993.

[10] M. Reiter, K. Birman, and R. van Renesse, “A security architecture for fault-tolerant systems,” ACM Trans. Comput. Syst, vol. 12, no. 4, pp. 340-371, 1994.

[11] C. Bennet and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984.

Downloads

Published

2016-10-27

How to Cite

BENMACHICHE, A., Ali, S., & Messikh, A. (2016). A source authentication and data confidentiality scheme based on TESLA protocol and XOR encryption for multicast. International Journal on Perceptive and Cognitive Computing, 2(2). https://doi.org/10.31436/ijpcc.v2i2.23