A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment

Real-time media streams are a common application on the Internet today. For many such streams, it is necessary to provide authentication, data integrity, and non-repudiation. Some applications where this type of security may be necessary include voice-over-IP (VoIP) calls, transmission of sensitive...

Full description

Bibliographic Details
Main Author: Miller, Daniel
Language:en
Published: 2010
Subjects:
Online Access:http://hdl.handle.net/10012/5281
id ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-5281
record_format oai_dc
spelling ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-52812013-01-08T18:53:30ZMiller, Daniel2010-06-25T16:22:10Z2010-06-25T16:22:10Z2010-06-25T16:22:10Z2010http://hdl.handle.net/10012/5281Real-time media streams are a common application on the Internet today. For many such streams, it is necessary to provide authentication, data integrity, and non-repudiation. Some applications where this type of security may be necessary include voice-over-IP (VoIP) calls, transmission of sensitive data such as medical records or personal information, or financial data that needs to be updated in real-time. It is important to be able to balance the need for security with the constraints of the environment, where data must be delivered in a limited amount of time. This thesis examines and classifies the different types of authentication based on a number of factors, mainly the type of authentication (user or data), the way in which authentication information is transmitted (embedded or appendix), and the secrecy of the authentication information (covert or overt). This thesis then presents a specific real-time communication system, and develops a novel method of achieving data authentication for the system, based on previous work done in the area of hash-chaining authentication schemes. Theoretical and simulated results are presented, showing that the new method, the modified butterfly scheme, outperforms the original method, the butterfly scheme, using the same amount of overhead.enA Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless EnvironmentThesis or DissertationElectrical and Computer EngineeringMaster of Applied ScienceElectrical and Computer Engineering
collection NDLTD
language en
sources NDLTD
topic Electrical and Computer Engineering
spellingShingle Electrical and Computer Engineering
Miller, Daniel
A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
description Real-time media streams are a common application on the Internet today. For many such streams, it is necessary to provide authentication, data integrity, and non-repudiation. Some applications where this type of security may be necessary include voice-over-IP (VoIP) calls, transmission of sensitive data such as medical records or personal information, or financial data that needs to be updated in real-time. It is important to be able to balance the need for security with the constraints of the environment, where data must be delivered in a limited amount of time. This thesis examines and classifies the different types of authentication based on a number of factors, mainly the type of authentication (user or data), the way in which authentication information is transmitted (embedded or appendix), and the secrecy of the authentication information (covert or overt). This thesis then presents a specific real-time communication system, and develops a novel method of achieving data authentication for the system, based on previous work done in the area of hash-chaining authentication schemes. Theoretical and simulated results are presented, showing that the new method, the modified butterfly scheme, outperforms the original method, the butterfly scheme, using the same amount of overhead.
author Miller, Daniel
author_facet Miller, Daniel
author_sort Miller, Daniel
title A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
title_short A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
title_full A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
title_fullStr A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
title_full_unstemmed A Hash-Chain Based Method for Full or Partial Authentication of Communication in a Real-Time Wireless Environment
title_sort hash-chain based method for full or partial authentication of communication in a real-time wireless environment
publishDate 2010
url http://hdl.handle.net/10012/5281
work_keys_str_mv AT millerdaniel ahashchainbasedmethodforfullorpartialauthenticationofcommunicationinarealtimewirelessenvironment
AT millerdaniel hashchainbasedmethodforfullorpartialauthenticationofcommunicationinarealtimewirelessenvironment
_version_ 1716573576884125696