An overview of streamed data authentication techniques



Publication Details

Wysocki, B. J. (2004). an Overview of Streamed Data Authentication Techniques. In T. A. Wysocki, A. Dadej & B. J. Wysocki (Eds.), Advanced Wired and Wireless Networks (pp. 187-206). New York, USA: Springer.


In the chapter we present some of the techniques proposed for authenticating digital streams. We start with the so-called block signatures, where every packet contains full information needed for its authentication. Then, we describe two techniques based on a simple hash chain for an off-line authentication and its modification where one-time signatures are used for an on-line authentication. Later, we consider the TESLA scheme for authenticating streams in case of synchronous systems. This is followed by augmented hash chains with signature packets used once per a sequence of packets rather than for the whole stream. The chapter is concluded with a short comparison of the considered techniques.

Please refer to publisher version or contact your library.



Link to publisher version (DOI)