电信科学 ›› 2010, Vol. 26 ›› Issue (10): 66-70.doi: 10.3969/j.issn.1000-0801.2010.10.017

• 研究与开发 • 上一篇    下一篇

基于Hash链的高效组播源认证协议

林庚1,乔占西2,于昕3   

  1. 1 北京科技大学信息工程学院 北京100083
    2 河南科技大学 洛阳471003
    3 北京科技大学土木与环境工程学院 北京100083
  • 出版日期:2010-10-15 发布日期:2010-10-15
  • 基金资助:
    国家自然科学基金资助课题“认知无线电安全关键技术研究”

Effective Multicast Source Authentication Protocol Based on Hash-Chaining

Geng Lin1,Zhanxi Qiao2,Xin Yu3   

  1. 1 School of Information Engineering,Science and Technology University of Beijing,Beijing 100083,China
    2 Henan Science & Technology University,Luoyang 471003,China
    3 School of Civil and Environment Engineering,Science and Technology University of Beijing,Beijing 100083,China
  • Online:2010-10-15 Published:2010-10-15

摘要:

针对现有基于Hash链思想的组播源认证协议存在接收方认证延迟和抗丢包性弱的缺陷,提出一种基于Hash链的高效组播源认证协议。该协议结合了向前方数据包添加Hash值的方法,将链中发送的数据包签名,在接收方实现实时认证。通过合理选择目标包,增强协议抗丢包性。同时,采用在接收方添加变化阈值的方法,改进了接收方反馈子网丢包率方式,节约了网络带宽,减轻了发送方的计算开销。文中给出了具体的设计方案,与相关组播源认证协议比较,其具有实时认证、抗丢包鲁棒性、减轻网络负担和发送方计算开销的特点。

关键词: 组播安全, Hash链, 源认证, 抗抵赖性

Abstract:

To the main limitation that current multicast source authentication protocol based on the idea of Hash-chaining have authentication delay at the receivers and are not robust against packet losses,this paper presents an effective multicast source authentication protocol based on Hash-chaining. In this protocol,the Hash value is put into preceding packet,and the first sending packet is signed in Hash-chaining,performing authentication in real-time at receivers. Through selecting object packet in a reasonable manner,the ability of tolerating packet loss is improved. At the same time,through adding threshold of variety at receiver,it changes the feedback way of losing packet ratio at receivers in subnet so as to save bandwidth and alleviate computation overheads at sender. The design of new protocol is concretely presented in this paper. Through comparing with related multicast source authentication protocol,it has the following traits:performing authentication in real-time at receivers, tolerating packet loss,saving bandwidth and alleviating computation overheads at sender.

Key words: multicast security, Hash-chaining, source authentication, non-repudiation

No Suggested Reading articles found!