Networking

Multicast Routing Authentication System Using Advanced Tesla

Free registration required

Executive Summary

The present strategies that reduce the delay associated with multicast authentication, make more efficient usage of receiver-side buffers, make delayed key disclosure authentication more resilient to buffer overflow denial of service attacks, and allow for multiple levels of trust in authentication. Throughout this base paper, the main focus of discussion will be on the popular multicast authentication scheme Timed Efficient Stream Loss-tolerant Authentication (TESLA) based upon the delayed key disclosure principle. Similar to other schemes based upon delayed key disclosure, TESLA is susceptible to Denial-of-Service (DoS) attacks and is not well suited for delay-sensitive applications.

  • Format: PDF
  • Size: 339.3 KB