You are on page 1of 3

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing

A Hybrid and Efficient Scheme of Multicast Source Authentication

HE Jin-xin XU Gao-chao FU Xiao-dong ZHOU Zhi-guo


1 College of College of College of Computer 1 College of
Computer Science Computer Science Science and Computer Science
and Technology and Technology Technology and Technology
Jilin University Jilin University Jilin University Jilin University
Changchun, P.R. Changchun, P.R. Changchun, P.R. Changchun, P.R.
China China China China
2 College of Earth 2 College of
Sciences Computer
Jilin University Northeast Normal
Changchun, P.R. University
China Changchun, P.R.
China

Abstract successful deployment of group communication


applications. There are three distinct problem areas to
Source authentication is the most important and consider in providing multicast security services [4].
difficult problem in multicast security, and no First and most important, in secure multicast group
schemes can satisfy all multicast applications. So a members must be able to verify that the data received
Hybrid Multicast Source Authentication (HMSA) is indeed sent by an authorized sender. This is called
scheme was proposed based on two data structures: origin authentication, includes group authentication
hashing tree and hashing chain. Compared with and source authentication. Group authentication is
some other schemes in computation and the property that guarantees only that a message was
communication overheads, HMSA is simple, efficient sent (or last modified) by a member of the group.
and secure. Since a MAC (Message Authentication Code) can be
used for group authentication, it is rather inexpensive
1. Introduction to authenticate even streaming data in real time. But
in most applications the receivers must be able to
Fueled by the explosive growth of the Internet and establish the source of the data, at least for
growing demand for novel types of group themselves. In other words, source authentication is
communications, multicast has received a lot of more and more needed in multicast applications.
attention in recent years. In multicast, a single copy Moreover, a stronger version of the above property,
of packets is sent by the sender and routed to each referred to as non-repudiation, which enables each
receiver within the multicast group via receiver to prove the origin of data to any impartial
multicast-enabled router. For a wide range of third party [5]. Unfortunately, multicast source
applications, multicast is an efficient and natural way authentication is a difficult problem. The simplest
of communicating information [9]. However, solution is to digitally sign each packet, but signing
multicast services lack support for traffic each packet is computationally expensive, and
management, accounting and billing, reliability, and introduces excessive per packet communication
security. So multicast security is identified as one of overhead. Several solutions have been documented
the most important problems to solve for the that amortize the cost of digital signatures over
——————————- multiple packets, such as hashing tree and hashing
This work is supported by the Jilin Province Natural Science chain [3]. However, neither of them is efficient for
Foundation of China (Grant No.20050522). all kind of multicast applications. So a Hybrid

0-7695-2909-7/07 $25.00 © 2007 IEEE 123


DOI 10.1109/SNPD.2007.176
Multicast Source Authentication (HMSA) scheme is block hash. Authenticity verification may require as
proposed based on hashing tree and hashing chain in many as O (log2 m) hash computations. Caching
this paper, and performance evaluations showed verified nodes decreases the number of hash
HMSA is cheaper, efficient and secure. computations for subsequent packet verifications of
the same block.
2. Related work Because the computation speed of hash
functions(MD5, SHA-1……)is about 1,000 times
2.1. Hashing tree faster than digital signature(RSA, ECC……)[1], the
computation overhead of hashing tree is much less
In the hashing tree scheme, the sender first divides than signing each packet. And tree hashing also
the whole data into M blocks and then divides each supports non-repudiation, since the root hash of each
block into m packets and computes the individual block is signed by the sender. However, per packet
packet hashes. For block hash computation, it communication overhead is even higher than signing
associates each individual packet hash with a leaf each packet.
node of the hash tree. Each internal node’s hash is
the hash of the concatenation of the children’s hashes. 2.2. Hashing chain
As Figure 1 depicted:
h12=hash(h1,h2), Hashing chain works as follows: first, the sender
h34=hash(h3,h4), divides the data into n blocks; second, it computes
……, the hash of the first block (for example, using MD5
h18=hash(h14, h58). or SHA-1), signs the hash payload, and sends the
signature to all receivers. It then sends each block
except the last block, appended with the hash of the
next block [8]. Figure 2 illustrates it: data is divided
into n blocks named B1, B2,……, Bn; the first
block’s hash B1 is signed; the first block consists of
B2’s hash along with the data; this continues until the
block Bn- 1, which contains the hash of Bn; the final
block does not contain a hash.

Figure 2. Hashing Chain

Each receiver verifies the sender’s signature,


extracts the hash of the first block and stores it.
Figure 1. Hashing Tree When the first block arrives, the receiver computes
the hash and compares it to the stored hash. If two
Using this function, the sender recursively computes hashes are identical, the first block’s integrity and
the root node’s hash. Within each packet, the sender authenticity is established. The receiver then extracts
includes the signed block hash, the packet ID, and the second block’s hash and stores it, and repeats this
the hashes of siblings of all the nodes in the current verification procedure until the last block. If the
packet’s path to the root [2]. Each receiver first packets are received in sequence, the receivers only
computes the hash of the received packet. It uses the need a buffer to hold a block and a hash. Note that
computed hash and the received hashes to compute due to the authentication chain that ends up in a
the root hash. If the computed root hash is identical signature packet, hashing chain also provides
to the signed block hash, the received packet is non-repudiation [7].
authentic. In hashing chain, there is only one public key
Authenticity verification of the first received operation at the sender (a signature) and each
packet of a block consists of a signature verification, receiver (a verification). In addition, all parties
and computation of all hashes in the path from the compute n hashes. Overall, this scheme only adds 1
packet’s position in the tree to the root. In all, the signature (RSA is 128 bytes) and n hashes (n * 20
receiver needs to compute O (log2 m) hashes. Future bytes, with SHA-1 for hashing) worth of overhead in
packet verifications require fewer hash computations authenticating the entire stream. So both computation
and no signature verification operations. Each packet and communication overheads of hashing chain are
carries only O (log2 m) hashes along with the signed

124
less than hashing tree. But this scheme can not 4. Conclusion
tolerate packet loss, and the receivers can not
authenticate any future packets once any portion of In this paper, a novel scheme of multicast source
data is lost in transit. Furthermore, out-of-order authentication that was named “HMSA” is proposed,
packet reception is also troublesome, and an and it includes some merits as follow:
out-of-order packet must be buffered until all the (1) Both computation and communication overheads
packets leading up to it are received and verified [6]. are reasonable and acceptable;
(2) Each packet is authenticated immediately, which
3. HMSA scheme is loss-tolerant;
(3) Non-repudiation is supported.
3.1. Main idea So HMSA is efficient and practical to the most
source authentication of multicast applications. The
As mentioned above, the main disadvantage of next work is to compare it with some other schemes
hashing tree is high communication overhead, and in detail using NS-2(Network Simulator version 2).
hashing chain is inefficient to packet loss. So we
considered how to combine hashing tree with References
hashing chain efficiently, and make up of a Hybrid
Multicast Source Authentication (HMSA) scheme. In [1] M.Baugher, R.Canetti, L.Dondeti and F.Lindholm.
hashing tree each packet carries 1 signature and (log2 “Multicast Security(MESC) Group Key Management
m) hashes of siblings of all the nodes in the current Architecture”. IETF RFC 4046, April 2005.
packet’s path to the root. However, each receiver
only needs to verify the first packet of each block, so [2] Yacine Challal, Abdelmadjid Bouabdallah and Yoann
Hinard. “Efficient multicast source authentication using
there are (m-1) packets carrying useless signatures in
layered hash-chaining scheme”. Proceedings of the 29th
each packet. Since hashing chain only needs 1 Annual IEEE International Conference on Local Computer
signature totally, HMSA uses hashing chain to Networks(LCN’04).
reduce the communication overhead of hashing tree
as below: first, the sender calculates the root hash of [3] Thomas Hardjono, Laksminiath R. Dondeti. “Multicast
each block using hashing tree; second, sends a packet and Group Security”. Artech House Inc, 2003.
carrying the signature of the first block’s root hash to
each receiver; last, sends each packet carrying (log2 [4] T. Hardjono, B. Weis. “The Multicast Group Security
m) hashes of siblings of all the nodes in the current Architecture”. IETF RFC 3740, March 2004.
packet’s path to the root and the root hash of the next
[5] Xianxian Li, Jinpeng Huai. “Efficient Non-Repudiation
block, after each receiver received the signature Multicast Source Authentication Schemes”. J. Comput. Sci.
packet normally. To each receiver, firstly the root & Technol. pp.820-829, 17(6), 2002.
signature of the first block is verified, if verification
is passed then each packet of the first block and the [6] Sanjoy Paul. “Multicasting on the internet and its
root hash of the second block is verified; secondly applications”. Kluwer Academic Publishers, 1998.
each packet of the second block is verified using the
root hash of the second block; …… ; finally the [7] A. Perrig, R. Canetti, D. Song, and J. D. Tygar.
origins of all packets is verified. “Efficient and secure source authentication for multicast”.
Network and Distributed System Security Symposium,
pp.35-46, February 2001.
3.2. Performance evaluations
[8] A.Perrig, D.Song, R.Canetti, J.D.Tygar and B.Briscoe.
In summary, HMSA only needs 1 signature and n* “Timed Efficient Stream Loss-Tolerant
( log2 m+1 ) hashes, so both computation and Authentication(TESLA): Multicast Source Authentication
communication overheads of it are much less than Transform Introduction”. IETF RFC 4082, June 2005.
hashing tree, but a little higher than hashing chain.
[9] Jung Min Park, Edwin K.P. Chong and Howard Jay
However, HMSA is loss-tolerant if the maximum Siegel. “Efficient Multicast Packet Authentication Using
length of loss packet is less than the length of each Signature Amortization”. Proceedings of the 2002 IEEE
block, so which is superior to hashing chain in it. Symposium on Security and Privacy, 2002.

125

You might also like