Professional Documents
Culture Documents
Guide:: Ms. A.Princy M.E., (Senior Lecturer - CSE)
Guide:: Ms. A.Princy M.E., (Senior Lecturer - CSE)
PROJECT MEMBERS:
Ms. A.Princy M.E.,
(Senior Lecturer - CSE) Raj Thilak.D (80907132029)
Rajkumar.R (80907132030)
Vishwanath.V (80907132041)
1/25
We propose a multicast authentication
protocol, namely MABS for efficient data transfer in
internet, wireless networks and mobile networks. The
main objective of this protocol is to decrease the
latency time, reducing the computation cost and
communication overhead. It is also used to alleviate the
DoS impact of adversaries.
2/25
Multicast
– Real time stock quotes, interactive games, video conference or
video on demand.
Authentication
– Data integrity
– Data origin authentication
– Nonrepudiation
Signature
UDP is used instead of TCP
Resource-constrained mobile handsets
3/25
Software Requirements
Language : Java 2
GUI Tool : Swing
IDE : Netbeans-6.9.1
Hardware Requirements
4/25
Signing and verifying each packet individually
◦ High computational cost
Block-based authentication
◦ Heterogeneity problem
Tree chaining
Graph chaining
◦ High latency
◦ Communication overhead
5/25
There are basically two schemes
Basic scheme
– Batch signature
– RSA, BLS, DSA
– perfect resilience to packet loss in lossey channels
– less latency, computation, and communication overhead
Enhanced scheme
– Packet filtering mechanism
– DoS defense
6/25
MAP CLIENT
UDP APP
………
UDP
MAP CLIENT
UDP
APP
7/25
There are Five modules in our project and they are:
1) Network model
• Client interaction with server and connection establishment.
2) Multicast
• Replicating and sending the multimedia packets to all the clients.
3) MABS-B
• Batch RSA Implementation
• Batch BLS Implementation
• Batch DSA Implementation
4) MABS-E
• Packet filtering mechanism to alleviate DoS impact.
5) Performance Evaluation
• Evaluate resilience to packet loss, efficiency, and DoS resilience.
8/25
Server
Program
Listen
create in po
rt
Server
Socket add
c t/ Re /
n ne ect mo
ve
Co conn
dis
New
Socket Client Handler
Client
Data
9/25
Server
Client
Handler
10/25
Data
Generate
Packets
Combine
Packets
Data
11/25
12/25
RSA (Rivest Shamir Adleman)
Algorithm
Private key
Public key
Signature:
Verification:
Batch verification:
N
13/25
BLS (Bonch Lynn Shacham)
Algorithm
Private key
Public key
Signature:
Verification:
Batch verification:
N
14/25
DSA (Digital Signature Algorithm)
Private key
Public key
Signature for m is (r,s)
Verification:
Batch verification: N
15/25
Hacker
Data Organize
into Sets
Dummy
Packets
Generate
Packets Batch
Verification
Server Client On Sets
Socket Socket
Signing
Reject Accept
Data
16/25
17/25
Efficiency
◦ Latency
◦ Computation
◦ Communication Overhead
Resilience to Packet Loss
◦ Verification rate
◦ Loss rate
18/25
Dec 9, 2021 19
20/18
Dec 9, 2021 21
Dec 9, 2021 22
New Signature schemes can be applied to increase
the efficiency of the system.
Signature schemes selection can be made automatic
based on the number of receivers.
Compression ideas can be implemented with batch
signature to reduce communicational overhead.
23/25
Reduces signature verification overheads in the secure
multimedia multicasting.
While comparing with conventional methods we get
– More efficiency
– Less latency
Effectivelydeals with DoS attack.
Batch signatures BLS and DSA are more efficient than
RSA.
24/25
Rivest.R.L, Shamir.A, and Adleman.L, (1978) `A Method for Obtaining
Digital Signatures and Public-Key Cryptosystems,` Comm. ACM, vol. 21,
no. 2, pp. 120-126.
Boneh.D, Lynn.B and Shacham.H, (2001) `Short Signatures from the Weil
Pairing,` Proc. Seventh Int`l Conf. Theory and Application of Cryptology
and Information Security Advances in Cryptology (ASIACRYPT `01), pp.
514-532.
Lim.C.H and Lee.P.J, (1994) ‘Security of Interactive DSA Batch
Verification,’ IEE Electronic Letters, vol. 30, no. 19, pp. 1592-1593.
Zhou.Y and Fang.Y, (2006) `BABRA: Batch-Based Broadcast
Authentication in Wireless Sensor Networks,` Proc. IEEE GLOBECOM.
Jeong.J, Park.Y, and Cho.Y, (2005) ‘Efficient DoS Resistant Multicast
Authentication Schemes,’Proc. Int’l Conf. Computational Science and Its
Applications (ICCSA ’05).
25/25