Authors
Adrian Perrig, Ran Canetti, Dawn Song, J Doug Tygar
Publication date
2001/2/1
Conference
Network and distributed system security symposium, NDSS
Volume
1
Issue
2001
Pages
35-46
Description
One of the main challenges of securing multicast communication is source authentication, or enabling receivers of multicast data to verify that the received data originated with the claimed source and was not modified enroute. The problem becomes more complex in common settings where other receivers of the data are not trusted, and where lost packets are not retransmitted. Several source authentication schemes for multicast have been suggested in the past, but none of these schemes is satisfactorily efficient in all prominent parameters. We recently proposed a very efficient scheme, TESLA, that is based on initial loose time synchronization between the sender and the receivers, followed by delayed release of keys by the sender.
This paper proposes several substantial modifications and improvements to TESLA. One modification allows receivers to authenticate most packets as soon as they arrive (whereas TESLA requires buffering packets at the receiver side, and provides delayed authentication only). Other modifications improve the scalability of the scheme, reduce the space overhead for multiple instances, increase its resistance to denial-of-service attacks, and more.
Total citations
200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202439265858719270765051515550563438292021111510115
Scholar articles
A Perrig, R Canetti, D Song, JD Tygar - Network and distributed system security symposium …, 2001