An overview of streamed data authentication techniques

RIS ID

13252

Publication Details

Wysocki, B. J. (2004). an Overview of Streamed Data Authentication Techniques. In T. A. Wysocki, A. Dadej & B. J. Wysocki (Eds.), Advanced Wired and Wireless Networks (pp. 187-206). New York, USA: Springer.

Abstract

In the chapter we present some of the techniques proposed for authenticating digital streams. We start with the so-called block signatures, where every packet contains full information needed for its authentication. Then, we describe two techniques based on a simple hash chain for an off-line authentication and its modification where one-time signatures are used for an on-line authentication. Later, we consider the TESLA scheme for authenticating streams in case of synchronous systems. This is followed by augmented hash chains with signature packets used once per a sequence of packets rather than for the whole stream. The chapter is concluded with a short comparison of the considered techniques.

Please refer to publisher version or contact your library.

Share

COinS
 

Link to publisher version (DOI)

http://dx.doi.org/10.1007/0-387-22792-X_10