1 / 12

MLCC: A N ew Hash-chained Mechanism for Multicast Source Authentication

MLCC: A N ew Hash-chained Mechanism for Multicast Source Authentication. Source: International Journal of Communication Systems Authors: H. Eltaief, and H. Youssef Presenter: Chia-Chang Sung( 宋佳璋 ) Date: 2010/08/27. Outline. Introduction Hash-chained mechanism Proposed scheme

minty
Download Presentation

MLCC: A N ew Hash-chained Mechanism for Multicast Source Authentication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MLCC: ANew Hash-chained Mechanism for Multicast Source Authentication Source: International Journal of Communication Systems Authors: H. Eltaief, and H. Youssef Presenter: Chia-Chang Sung(宋佳璋) Date: 2010/08/27

  2. Outline • Introduction • Hash-chained mechanism • Proposed scheme • Analysis • Comparison • Comment

  3. Introduction • Goal • Propose a new hash-chained mechanism to achieve stronger resistance to packet losses with low overhead and high authenticationprobability • Related work • Hash-chained mechanism

  4. Hash-chained mechanism P2 P1 P3 D2 D1 D3 Sign(P1) H(P3) H(P2) Hash Hash

  5. Proposed scheme

  6. Proposed scheme

  7. 1 4 7 nline=3 ncol=3 nhline=3 nhcol=1 2 5 8 Layer1 3 6 9 10 13 16 11 14 17 12 15 18 Layer2

  8. Analysis(1/3)

  9. Analysis(2/3) s=128B h=64B nhcol=1 nhline=2 nhsig=4

  10. Analysis(3/3)

  11. Comparison nmes=1000, h=10B, s=128B

  12. Comments • Not suitable for real-time applications • Lower overhead may cause more delay • The performance can be estimated

More Related