An Application-Level Data Transparent Authentication Scheme without Communication Overhead

作者: Songqing Chen , Shiping Chen , Xinyuan Wang , Zhao Zhang , Sushil Jajodia

DOI: 10.1109/TC.2010.80

关键词: AuthenticationCovert channelData streamCryptographic hash functionData Authentication AlgorithmComputer scienceThe InternetComputer networkOverhead (computing)Data stream miningMessage authentication codeNetwork packetEncryption

摘要: With abundant aggregate network bandwidth, continuous data streams are commonly used in scientific and commercial applications. Correspondingly, there is an increasing demand of authenticating these streams. Existing strategies explore stream authentication by using message codes (MACs) on a certain number packets (a block) to generate digest, then either embedding the digest into original data, or sending out-of-band receiver. Embedding approaches inevitably change which not acceptable under some circumstances (e.g., when sensitive information included data). Sending incurs additional communication overhead, consumes more critical resources power wireless devices for receiving information) besides bandwidth. In this paper, we propose novel strategy, DaTA, effectively authenticates selectively adjusting interpacket delay. This scheme requires no overhead. Modeling-based analysis experiments conducted implemented prototype system LAN over Internet show that our proposed efficient practical.

参考文章(24)
Chris Karlof, Naveen Sastry, Adrian Perrig, J. D. Tygar, Yaping Li, Distillation Codes and Applications to DoS Resistant Multicast Authentication network and distributed system security symposium. ,(2004)
Nagendra Modadugu, Philippe Golle, Authenticating Streamed Data in the Presence of Random Packet Loss. network and distributed system security symposium. ,(2001)
Geoffrey M. Voelker, Henry M. Levy, Maureen Chesire, Alec Wolman, Measurement and analysis of a streaming-media workload usenix symposium on internet technologies and systems. pp. 1- 1 ,(2001)
Alain Pannetrat, Real time multicast authentication ISOC. ,(2003)
Pankaj Rohatgi, A compact and fast hybrid signature scheme for multicast packet authentication computer and communications security. pp. 93- 100 ,(1999) , 10.1145/319709.319722
Zheng Liu, Xue Li, Zhaoyang Dong, Multimedia authentication with sensor-based watermarking Proceedings of the 2004 multimedia and security workshop on Multimedia and security - MM&Sec '04. pp. 155- 159 ,(2004) , 10.1145/1022431.1022458
Baiying Lei, Ing Yann Soon, A multipurpose audio watermarking algorithm with synchronization and encryption Journal of Zhejiang University SCIENCE C. ,vol. 13, pp. 11- 19 ,(2012) , 10.1631/JZUS.C1100085
Frank H. Hartung, Bernd Girod, Watermarking of MPEG-2 encoded video without decoding and reencoding conference on multimedia computing and networking. ,vol. 3020, pp. 264- 274 ,(1997) , 10.1117/12.264299
Minghua Chen, Yun He, R.L. Lagendijk, A fragile watermark error detection scheme for wireless video communications IEEE Transactions on Multimedia. ,vol. 7, pp. 201- 211 ,(2005) , 10.1109/TMM.2005.843367
L. Qiao, K. Nahrstedt, Watermarking methods for MPEG encoded video: towards resolving rightful ownership international conference on multimedia computing and systems. pp. 276- 285 ,(1998) , 10.1109/MMCS.1998.693656