Source authentication scheme in multicast based on tree chaining
WU Tao1,ZHENG Xue-feng2,ZHANG Wen-jun1,LIU Zhen-hua1,MU Cui-xia1
(1.Dept. of Computer, China Women’s University,Beijing 100101, China;2.School of Information & Engineering, University of Science & Technology Beijing, Beijing 100083, China)
Abstract:This paper briefly reviewed the existing source authentication schemes and described the advantages and disadvantages of these schemes.Then,proposed a new source authentication scheme based on tree chaining, in which, the abstract came from different block was connected used the technology similar T-CSA, thus expanded the superiority of T-CSA and reduced the average delay on every packet. Moreover, the average authetincation price on each packet will drop along with the unceasingly increases of the data stream, this is very important to the member machines with limited resources. ......