Professional Documents
Culture Documents
Abstract
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size. The correlation among packets makes them vulnerable to packet loss. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments. In this project, we propose a novel multicast authentication protocol, namely MABS, including two schemes. I. MABS - B II. MABS - E
Introduction
MULTICAST is an efficient method to deliver multimedia content from a sender to a group of receivers . Authentication is one of the critical topics in securing multicast in an environment attractive to malicious attacks. Basically, multicast authentication may provide the following security services:
Data Integrity: Each receiver should be able to assure that received packets have not been modified during transmissions. Data Origin Authentication: Each receiver should be able to assure that each received packet comes from the real sender as it claims. Nonrepudiation: The sender of a packet should not be able to deny sending the packet to receivers in case there is a dispute between the sender and receivers.
Problem Defination
Efficiency and packet loss resilience can hardly be supported simultaneously by conventional multicast schemes.
Proposed System
We present our comprehensive study on this approach and propose a novel multicast authentication protocol called MABS (in short for Multicast
The enhanced scheme (called MABS-E hereafter) combines MABS-B with packet filtering to alleviate the DoS impact in hostile environments. MABS provides data integrity, origin authentication, and nonrepudiation as previous asymmetric key based protocols.
Flow chart
Sende r Selec t Data
Generate private and public key Generate the signature using private key Attach signatu re to messag e
Data decrypt
yes
Verif y No
Destinati on
Discar d
Given a message m in the signing phase, the sender first computes h = h( m ) G1, where h() is a hash function, then computes = the signature of m .
Transmission
After generating the signature it will be attached to the block of messages. Then the block of messages will be transmitted to the destination. The destination can be received the messages from the buffer. While receiving the message it can verify the signature. If the result is true it will be accepted otherwise the message will discarded.
Verification
In the Batch Verify () algorithm should satisfy the following properties: Given a batch of packets that have been signed by the sender, BatchVerify () outputs True. Given a batch of packets including some unauthentic packets, the probability that BatchVerify () outputs True is very low.
The computation complexity of BatchVerify () is comparable to that of verifying one signature and is increased only gradually when the batch size n is increased.
ADVANTAGES
MABS can achieve perfect resilience to packet loss in lossy channels in the sense that no matter how many packets are lost the already-received packets can still be authenticated by receivers. MABS-B is efficient in terms of less latency, computation, and communication overhead.
Thank You