Networking

Authenticast: A Source Authentication Protocol for Multicast Flows and Streams

Download Now Free registration required

Executive Summary

The lack of security obstructs a large scale deployment of the multicast communication model. Therefore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity and access control. Many applications require authenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture.

  • Format: PDF
  • Size: 370.6 KB