作者: Songqing Chen , Shiping Chen , Xinyuan Wang , Zhao Zhang , Sushil Jajodia
DOI: 10.1109/TC.2010.80
关键词: Authentication 、 Covert channel 、 Data stream 、 Cryptographic hash function 、 Data Authentication Algorithm 、 Computer science 、 The Internet 、 Computer network 、 Overhead (computing) 、 Data stream mining 、 Message authentication code 、 Network packet 、 Encryption
摘要: With abundant aggregate network bandwidth, continuous data streams are commonly used in scientific and commercial applications. Correspondingly, there is an increasing demand of authenticating these streams. Existing strategies explore stream authentication by using message codes (MACs) on a certain number packets (a block) to generate digest, then either embedding the digest into original data, or sending out-of-band receiver. Embedding approaches inevitably change which not acceptable under some circumstances (e.g., when sensitive information included data). Sending incurs additional communication overhead, consumes more critical resources power wireless devices for receiving information) besides bandwidth. In this paper, we propose novel strategy, DaTA, effectively authenticates selectively adjusting interpacket delay. This scheme requires no overhead. Modeling-based analysis experiments conducted implemented prototype system LAN over Internet show that our proposed efficient practical.