Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 25

GUIDE:

PROJECT MEMBERS:
Ms. A.Princy M.E.,
(Senior Lecturer - CSE) Raj Thilak.D (80907132029)
Rajkumar.R (80907132030)
Vishwanath.V (80907132041)

1/25
We propose a multicast authentication
protocol, namely MABS for efficient data transfer in
internet, wireless networks and mobile networks. The
main objective of this protocol is to decrease the
latency time, reducing the computation cost and
communication overhead. It is also used to alleviate the
DoS impact of adversaries.

2/25
 Multicast
– Real time stock quotes, interactive games, video conference or
video on demand.
 Authentication
– Data integrity
– Data origin authentication
– Nonrepudiation
 Signature
 UDP is used instead of TCP
 Resource-constrained mobile handsets

3/25
Software Requirements
Language : Java 2
GUI Tool : Swing
IDE : Netbeans-6.9.1

Hardware Requirements

PROCESSOR : Pentium IV and above


SPEED : 1.3 GHz and above
HDD : 40 GB
RAM : 256 MB

4/25
 Signing and verifying each packet individually
◦ High computational cost
 Block-based authentication
◦ Heterogeneity problem
 Tree chaining
 Graph chaining

◦ High latency
◦ Communication overhead

5/25
There are basically two schemes
 Basic scheme
– Batch signature
– RSA, BLS, DSA
– perfect resilience to packet loss in lossey channels
– less latency, computation, and communication overhead
 Enhanced scheme
– Packet filtering mechanism
– DoS defense

6/25
MAP CLIENT
UDP APP

SERVER MAP CLIENT


UDP APP
INTERNET
/ LAN /
WIRELESS
MAP MAP CLIENT
NETWORK UDP APP

………
UDP

MAP CLIENT
UDP
APP

7/25
There are Five modules in our project and they are:

1) Network model
• Client interaction with server and connection establishment.
2) Multicast
• Replicating and sending the multimedia packets to all the clients.
3) MABS-B
• Batch RSA Implementation
• Batch BLS Implementation
• Batch DSA Implementation
4) MABS-E
• Packet filtering mechanism to alleviate DoS impact.
5) Performance Evaluation
• Evaluate resilience to packet loss, efficiency, and DoS resilience.

8/25
Server
Program
Listen
create in po
rt

Server
Socket add
c t/ Re /
n ne ect mo
ve
Co conn
dis
New
Socket Client Handler
Client
Data

9/25
Server

Multimedia Process Generate Replicate


Data Data Packets Packets

Client
Handler

Client Client ……… Client

10/25
Data

Generate
Packets

Server Client Batch


Signing
Socket Socket Verification

Combine
Packets

Data
11/25
12/25
RSA (Rivest Shamir Adleman)
Algorithm
 Private key
 Public key
 Signature:
 Verification:
 Batch verification:
N

13/25
BLS (Bonch Lynn Shacham)
Algorithm
 Private key
 Public key
 Signature:
 Verification:
 Batch verification:
N

14/25
DSA (Digital Signature Algorithm)
 Private key
 Public key
 Signature for m is (r,s)

 Verification:

 Batch verification: N

15/25
Hacker

Data Organize
into Sets
Dummy
Packets
Generate
Packets Batch
Verification
Server Client On Sets
Socket Socket
Signing
Reject Accept

Merkle Tree Apply Unique Combine


Generation Mark Packets

Data
16/25
17/25
 Efficiency
◦ Latency
◦ Computation
◦ Communication Overhead
 Resilience to Packet Loss
◦ Verification rate
◦ Loss rate

18/25
Dec 9, 2021 19
20/18
Dec 9, 2021 21
Dec 9, 2021 22
 New Signature schemes can be applied to increase
the efficiency of the system.
 Signature schemes selection can be made automatic
based on the number of receivers.
 Compression ideas can be implemented with batch
signature to reduce communicational overhead.

23/25
 Reduces signature verification overheads in the secure
multimedia multicasting.
 While comparing with conventional methods we get
– More efficiency
– Less latency
 Effectivelydeals with DoS attack.
 Batch signatures BLS and DSA are more efficient than

RSA.

24/25
 Rivest.R.L, Shamir.A, and Adleman.L, (1978) `A Method for Obtaining
Digital Signatures and Public-Key Cryptosystems,` Comm. ACM, vol. 21,
no. 2, pp. 120-126.
 Boneh.D, Lynn.B and Shacham.H, (2001) `Short Signatures from the Weil
Pairing,` Proc. Seventh Int`l Conf. Theory and Application of Cryptology
and Information Security Advances in Cryptology (ASIACRYPT `01), pp.
514-532.
 Lim.C.H and Lee.P.J, (1994) ‘Security of Interactive DSA Batch
Verification,’ IEE Electronic Letters, vol. 30, no. 19, pp. 1592-1593.
 Zhou.Y and Fang.Y, (2006) `BABRA: Batch-Based Broadcast
Authentication in Wireless Sensor Networks,` Proc. IEEE GLOBECOM.
 Jeong.J, Park.Y, and Cho.Y, (2005) ‘Efficient DoS Resistant Multicast
Authentication Schemes,’Proc. Int’l Conf. Computational Science and Its
Applications (ICCSA ’05).

25/25

You might also like