The Community for Technology Leaders
Green Image
Issue No. 07 - July (2010 vol. 59)
ISSN: 0018-9340
pp: 943-954
Songqing Chen , George Mason University, Fairfax
Shiping Chen , Sybase, Inc.
Xinyuan Wang , George Mason University, Fairfax
Zhao Zhang , Iowa State University, Ames
Sushil Jajodia , George Mason University, Fairfax
With abundant aggregate network bandwidth, continuous data streams are commonly used in scientific and commercial applications. Correspondingly, there is an increasing demand of authenticating these data streams. Existing strategies explore data stream authentication by using message authentication codes (MACs) on a certain number of data packets (a data block) to generate a message digest, then either embedding the digest into the original data, or sending the digest out-of-band to the receiver. Embedding approaches inevitably change the original data, which is not acceptable under some circumstances (e.g., when sensitive information is included in the data). Sending the digest out-of-band incurs additional communication overhead, which consumes more critical resources (e.g., power in wireless devices for receiving information) besides network bandwidth. In this paper, we propose a novel strategy, DaTA, which effectively authenticates data streams by selectively adjusting some interpacket delay. This authentication scheme requires no change to the original data and no additional communication overhead. Modeling-based analysis and experiments conducted on an implemented prototype system in an LAN and over the Internet show that our proposed scheme is efficient and practical.
DaTA, authentication, timing correlation, covert channel, data transparent.

S. Chen, X. Wang, S. Chen, S. Jajodia and Z. Zhang, "An Application-Level Data Transparent Authentication Scheme without Communication Overhead," in IEEE Transactions on Computers, vol. 59, no. , pp. 943-954, 2010.
94 ms
(Ver 3.3 (11022016))