Back to Search Start Over

An Application-Level Data Transparent Authentication Scheme without Communication Overhead.

Authors :
Chen, Songqing
Chen, Shiping
Wang, Xinyuan
Zhang, Zhao
Jajodia, Sushil
Source :
IEEE Transactions on Computers. Jul2010, Vol. 59 Issue 7, p943-954. 12p.
Publication Year :
2010

Abstract

With abundant aggregate network bandwidth, continuous data streams are commonly used in scientific and commercial applications. Correspondingly, there is an increasing demand of authenticating these data streams. Existing strategies explore data stream authentication by using message authentication codes (MACs) on a certain number of data packets (a data block) to generate a message digest, then either embedding the digest into the original data, or sending the digest out-of-band to the receiver. Embedding approaches inevitably change the original data, which is not acceptable under some circumstances (e.g., when sensitive information is included in the data). Sending the digest out-of-band incurs additional communication overhead, which consumes more critical resources (e.g., power in wireless devices for receiving information) besides network bandwidth. In this paper, we propose a novel strategy, DaTA, which effectively authenticates data streams by selectively adjusting some interpacket delay. This authentication scheme requires no change to the original data and no additional communication overhead. Modeling-based analysis and experiments conducted on an implemented prototype system in an LAN and over the Internet show that our proposed scheme is efficient and practical. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00189340
Volume :
59
Issue :
7
Database :
Academic Search Index
Journal :
IEEE Transactions on Computers
Publication Type :
Academic Journal
Accession number :
51197325
Full Text :
https://doi.org/10.1109/TC.2010.80