next up previous
Next: Scheme V: Accommodate a Up: TESLA: Timed Efficient Stream Previous: Scheme III: Achieving Fast

Scheme IV: Dealing with Dynamic Packet Rates

 

Our previous schemes used a fixed or predictable sender schedule, with each recipient knowing the exact sending time of each packet. Since this severely restricts the flexibility of senders, we design a scheme which allows senders to send at dynamic transmission rates, without the requirement that every receiver needs to know about the exact sending schedule of each packet. The solution to this problem is to pick the MAC key and the disclosed key in each packet only on a time interval basis instead of on a packet index basis. The sender uses the same key Ki to compute the MAC for all packets which are sent in the same interval i. All packets sent in interval i disclose the key Ki-d.

At session set-up the sender announces values T0 and TΔ, where the former is the starting time of the first interval and the latter is the duration of each interval. In addition the delay parameter d is announced. These announcements are signed by the sender. The interval index at any time period t is determined as i = {t-T0TΔ}. A key Ki is associated with each interval i. The keys are chained in the same way as in Scheme II. The sender uses the same key Ki' = F'(Ki) to compute the MAC for each packet which is sent in interval i. Every packet also carries the interval index i and discloses the key of a previous interval Ki-d. We refer to d as disclosure lag. The format of packet Pj is Pj = Mj, i, Ki-d, MAC(Ki',Mj). Figure 3 shows an example of this scheme, where d=4.

pjPj pjp1Pj+1 pjp2Pj+2 pjp3Pj+3 pjp4Pj+4 pjp5Pj+5 pjp6Pj+6 kip2Ki+2 kip3Ki+3 kip4Ki+4 kip5Ki+5 kip6Ki+6 kip7Ki+7

 


Figure 3: Scheme IV. The MAC key and disclosed key are only dependent on the time interval. The authentication key of Pj is Ki which is disclosed by packets sent during interval i+4. In this case, packet Pj+4 discloses key Ki+1 which allows the receiver to compute Ki and to authenticate packet Pj. We would like to point out that packets Pj+2 and Pj+3 are both authenticated with the same MAC key Ki+3', because they were sent in the same time interval. 

In this scheme, the receiver verifies the security condition as follows. Each receiver knows the values of T0, TΔ, and δt. (δt is the value obtained from the initial synchronization protocol.) Assume that the receiver gets packet Pj at its local time tj, and the packet was apparently sent in interval i. The sender can be at most in interval i' = {tj + δt - T0TΔ}. The security condition in this case is simply i + d > i', which ensures that no packet which discloses the value of the key could have been sent yet. Figure 4 illustrates the verification of the security condition.

It remains to describe how the values TΔ and d are picked. (We stress that the choice of these values does not affect the security of the scheme, only its usability.) Before the sender can pick values for TΔ and d, it needs to determine the maximum tolerable synchronization uncertainty δtMax, and the maximum tolerable network delay dNMax. The sender defines ΔMax&thicksp; def =&thicksp;δtMax + dNMax

The sender's choice for TΔ and ΔMax both present a tradeoff. First, a large value for ΔMax will allow slow receivers to verify the security condition correctly, but requires a long delay for packet authentication. Conversely, a short ΔMax will cause slow receivers to drop packets because the security condition is not satisfied. The second tradeoff is that a long interval duration TΔ saves on the computation and storage overhead of the key chain, but a short TΔ more closely achieves the desired ΔMax.

After determining δtMax, dNMax, and TΔ, the disclosure lag is d = {δtMax + dNMaxTΔ}.

This scheme provides numerous advantages. First, the sender can predict how long a pre-computed key chain lasts, since the number of necessary keys is only time dependent and not on the number of packets sent. Second, the receiver can conveniently verify the security condition and the sender does not need to send its packets at specific intervals (we will discuss the details of this in Section 2.9). Another advantage is that new receivers can easily join the group at any moment. A new group member only needs to synchronize its time with the sender and receive the interval parameters and a commitment to the key chain.

mdtt pdtt

 
figure361

Figure 4: The security condition visualized. The packet Pj is sent in the interval where key Ki+1 is active. The receiver receives the packet when the sender is in interval i+3, but due to the δt the sender might already be in interval i+4, which discloses key Ki. This is not a problem for the current packet, so key Ki+1 was not disclosed yet, hence the security condition is satisfied and the packet is safe. 


next up previous
Next: Scheme V: Accommodate a Up: TESLA: Timed Efficient Stream Previous: Scheme III: Achieving Fast

Adrian Perrig
Sat Sep 2 17:01:14 PDT 2000