A source authentication and data confidentiality scheme based on TESLA protocol and XOR encryption for multicast
-
Published:2016-10-27
Issue:2
Volume:2
Page:
-
ISSN:2462-229X
-
Container-title:International Journal on Perceptive and Cognitive Computing
-
language:
-
Short-container-title:IJPCC
Author:
BENMACHICHE Abderrahim,Ali Salami,Messikh Azeddine
Abstract
The source authentication and data confidentiality are needed in many multicast applications. Most of researches that have been done, attempt to solve just one aspect whether the source authentication or the confidentiality of data. In this paper, we aim to propose a scheme that can treat the two problems together. Our scheme stands on TESLA protocol to ensure the source authentication and the XOR encryption to ensure the confidentiality of the transmitted information. The result is this scheme can be applied on low bandwidth application and it does not require high computation devices whether in the source or in the receivers’ side. Furthermore, it tolerates to packet loss. According to the aforementioned advantages, the proposed scheme is secure from the both sides (authentication and confidentiality) moreover it does not cost much.
Subject
General Earth and Planetary Sciences,General Environmental Science
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A New Cooperation Model for Dynamic Networks;International Journal of Business Data Communications and Networking;2021-07