IIUM Repository

A source authentication and data confidentiality scheme for multicast networks

Benmachiche, Abderrahim and Ali, Salami and Messikh Azeddine, Azeddine (2016) A source authentication and data confidentiality scheme for multicast networks. International Journal on Perceptive and Cognitive Computing, 2 (2). pp. 1-4. ISSN 2462-229X

[img] PDF - Published Version
Restricted to Repository staff only

Download (627kB) | Request a copy

Abstract

Source authentication and data confidentiality are needed in many multicast applications. Most research attempted to solve either the source authentication or the confidentiality of data. This paper proposes a scheme that can treat the two problems together. Our scheme uses the TESLA protocol to ensure the source authentication and XOR encryption to ensure the confidentiality of the transmitted information so that the scheme can be applied to low bandwidth applications without requiring high computation devices. Furthermore, it tolerates packet-loss. These advantages render the proposed scheme secure in terms of authentication and confidentiality and it does not cost much.

Item Type: Article (Journal)
Additional Information: 3897/53007
Uncontrolled Keywords: Authentication, confidentiality, multicast applications
Subjects: T Technology > T Technology (General)
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr Azeddine Messikh
Date Deposited: 12 Dec 2016 13:12
Last Modified: 07 Feb 2017 11:02
URI: http://irep.iium.edu.my/id/eprint/53007

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year