This paper presents an improvement to the Interactive Chained Stream Authentication (I-CSA) protocol which is an efficient protocol useful to authenticate multicast transmissions over a network. The lockstep behavior intrinsic in its structure for data exchange may produce deadlocks, but not security breaches, in case the authentication information of the protocol is destroyed or modified by an intruder. The solution proposed (Enhanced I-CSA) introduces some modifications to the I-CSA protocol. This solution allows the parties involved in the transmission to continue the exchange of data in a secure manner even in case of packet losses, by accepting a reduced efficiency with respect to the I-CSA protocol.
Dealing with packet loss in the Interactive Chained Stream Authentication protocol
BERGADANO, Francesco;CAVAGNINO, Davide
2005-01-01
Abstract
This paper presents an improvement to the Interactive Chained Stream Authentication (I-CSA) protocol which is an efficient protocol useful to authenticate multicast transmissions over a network. The lockstep behavior intrinsic in its structure for data exchange may produce deadlocks, but not security breaches, in case the authentication information of the protocol is destroyed or modified by an intruder. The solution proposed (Enhanced I-CSA) introduces some modifications to the I-CSA protocol. This solution allows the parties involved in the transmission to continue the exchange of data in a secure manner even in case of packet losses, by accepting a reduced efficiency with respect to the I-CSA protocol.File | Dimensione | Formato | |
---|---|---|---|
ArtComp&SecJournal-Dealing with packet loss.pdf
Accesso riservato
Tipo di file:
POSTPRINT (VERSIONE FINALE DELL’AUTORE)
Dimensione
162.71 kB
Formato
Adobe PDF
|
162.71 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.