The lack of security obstructs a large scale de- ployment of the multicast communication model. There- fore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, in- tegrity and access control. Many applications require au- thenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source au- thentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simu- lated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.
 F. Bergadano, D. Cavagnino, and B. Crispo. Individual Sin-
gle Source Authentication on the MBone. IEEE International
Conference on Multimedia and Expo, 2000.
 Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, and
Moni Naor. Multicast Security: A taxonomy and Efficient Con-
structions. INFOCOM, 1999.
 Rosario Gennaro and Pankaj Rohatgi. How to Sign Digital
Streams. Information and Computation, 165(1):100-116, Febru-
 Sara Miner and Jessica Staddon. Graph-Based Authentication
of Digital Streams. IEEE Symposium on Security and Privacy,
 J. M. Park, E. K. P. Chong, and H. J Siegel. Efficient Multicast
Packet Authentication Using Signature Amortization. IEEE
Symposium on Security and Privacy, 2002.
 Vern Paxson. End-to-End Internet Packet Dynamics.
IEEE/ACM Transactions on Networking, 7(3):277-292, June
 A. Perrig, R. Canetti, J.D. Tygar, and D. Song. Efficient Au-
thentication and Signing of Multicast Streams over Lossy Chan-
nels. IEEE Symposium on Security and Privacy, 2000.
 Adrian Perrig. The BiBa One-Time Signature and Broadcast
Authentication Protocol. The 8th ACM Conference on Com-
puter and Communications Security, November 2001.
 Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. The
TESLA Broadcast Authentication Protocol. RSA CryptoBytes,
5, Summer 2002.
 Nagendra Modadugu Philippe Golle. Authenticating Streamed
Data in the Presence of Random Packet Loss. NDSS-01: The
Network and Distributed System Security Symposium, 2001.
 Chung Kei Wong and Simon S. Lam. Digital Signatures for
Flows and Multicasts. IEEE/ACM Transactions on Network-
ing, 7(4), August 1999.
 Maya Yajnik, Sue Moon, Jim Kurose, and Don Towsley. Mea-
surement and Modeling of the Temporal Dependence in Packet
Loss. INFOCOM-99, pages 345-352, March 1999.