Team for Research in
Ubiquitous Secure Technology

Lightweight, Pollution-Attack Resistant Multicast Authentication Scheme
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin

Citation
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin. "Lightweight, Pollution-Attack Resistant Multicast Authentication Scheme". ACM Symposium on Information, Computer and Communications Security, ACM, 148-156, March, 2006.

Abstract
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multicast packet with a digital signature incurs high overhead; therefore, a scheme such as signature amortization helps reduce this overhead. To tolerate packet loss, erasure codes are employed to enhance signature amortization. However, the use of erasure codes introduces pollution attack, an attack in which the adversary injects packets to disrupt the erasure decoding procedure and consequently denies the authentication service to the receiver. Unfortunately, current solutions to pollution attack are computationally intensive and inefficient. To cope with this problem, we propose a new lightweight, pollution-attack resistant multicast authentication scheme (PARM), which generates evidence that receivers can validate on a fast, per-packet basis. This approach effectively resists pollution attacks and has better performance than previously proposed solutions.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin. <a
    href="http://www.truststc.org/pubs/68.html"
    >Lightweight, Pollution-Attack Resistant Multicast
    Authentication Scheme</a>, ACM Symposium on
    Information, Computer and Communications Security, ACM,
    148-156, March, 2006.
  • Plain text
    Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin.
    "Lightweight, Pollution-Attack Resistant Multicast
    Authentication Scheme". ACM Symposium on Information,
    Computer and Communications Security, ACM, 148-156, March,
    2006.
  • BibTeX
    @inproceedings{LinShiehLin06_LightweightPollutionAttackResistantMulticastAuthentication,
        author = {Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin},
        title = {Lightweight, Pollution-Attack Resistant Multicast
                  Authentication Scheme},
        booktitle = {ACM Symposium on Information, Computer and
                  Communications Security},
        organization = {ACM},
        pages = {148-156},
        month = {March},
        year = {2006},
        abstract = {Authentication is an important security measure
                  for multicast applications, providing receivers
                  with confidence that the packets they receive are
                  valid. Simply signing every multicast packet with
                  a digital signature incurs high overhead;
                  therefore, a scheme such as signature amortization
                  helps reduce this overhead. To tolerate packet
                  loss, erasure codes are employed to enhance
                  signature amortization. However, the use of
                  erasure codes introduces pollution attack, an
                  attack in which the adversary injects packets to
                  disrupt the erasure decoding procedure and
                  consequently denies the authentication service to
                  the receiver. Unfortunately, current solutions to
                  pollution attack are computationally intensive and
                  inefficient. To cope with this problem, we propose
                  a new lightweight, pollution-attack resistant
                  multicast authentication scheme (PARM), which
                  generates evidence that receivers can validate on
                  a fast, per-packet basis. This approach
                  effectively resists pollution attacks and has
                  better performance than previously proposed
                  solutions.},
        URL = {http://www.truststc.org/pubs/68.html}
    }
    

Posted by Shiuhpyng Winston Shieh, Professor on 26 Apr 2006.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.