next up previous
Next: Scheme IV: Dealing with Up: TESLA: Timed Efficient Stream Previous: Scheme II: Tolerating Packet

Scheme III: Achieving Fast Transfer Rates

 

As we mentioned earlier, the receiver needs to be assured that it receives the packet Pi before the corresponding key disclosure packet Pi+1 is sent by the sender. This condition severely limits the transmission rate of the previous two schemes since Pi+1 can only be sent after every receiver has received Pi.

We solve this problem by disclosing the key Ki of the data packet Pi in a later packet Pi+d, instead of in the following packet, where d is a delay parameter that is set by the sender and announced as the session set-up.

The sender determines the delay d based on the packet rate r, the maximum tolerable synchronization uncertainty δtMax, and the maximum tolerable network delay dNMax. Setting d = (δtMax+dNMax)r allows the receiver to successfully verify the security condition even in the case of maximum allowable network delay and maximal synchronization error. The choice of δtMax and dNMax presents the following tradeoff: Large delay values will cause a large d which results in long delays until the packet authentication. On the other hand, short maximum delays cause the the security condition to drop packets at receivers with a slow network connection. However, multimedia data packets become obsolete if they are received after their segment of the stream was already played or presented to the user. In that case, dropping unsafe packets might not interfere with the multimedia stream since the packets are likely to be obsolete. We stress that the choice of d does not affect the security of the scheme, only its usability.

For the case of a constant packet rate, the security condition is easy to state. We assume that the sending time of the first packet is T0 and the sending time of packet Pi is Ti = T0 + i / r. To verify the security condition for an incoming packet, the receiver checks that ArrTi + δt < Ti+d, where ArrTi is the arrival time of packet Pi at the receiver.


next up previous
Next: Scheme IV: Dealing with Up: TESLA: Timed Efficient Stream Previous: Scheme II: Tolerating Packet

Adrian Perrig
Sat Sep 2 17:01:14 PDT 2000