Empirical Study on RTT Measurement for the Authentication Scheme in a DRM System

نویسندگان

  • Arjulie John P. Berena
  • Masami Kihara
چکیده

Packet delay is one of the most important metrics in network management and monitoring in the Internet. Recently, it has also been considered as a tool in distance estimation used for location-based services. In the Internet, packet delay is basically due to the link bandwidth, the propagation path distance, the number links, and the system resources at the end hosts. Quantitatively, the aggregate sum of the packet delay between the end hosts is practically equated to the constant and variable delay. The constant delay component is the minimum delay of the packet traversing the network and is usually associated with the packet transit time at an ideal condition, while the variable delay component is usually due to the queuing delay and the cross traffic effect that is represented by a long tail in the delay distribution. There are several probe packet types being used in Internet measurement such as the single packet, packet pair and packet train. These probes packets have been described and used in many applications for the purpose of monitoring the condition and characteristics of the network path. Each of these probe packet types serve a specific purpose they are designed for. For example, ping and traceroute, uses single packet to measure RTT between the two hosts, while packet pair and packet trains are used to specifically estimate the available and bottleneck bandwidth of the given link. In this paper, we will present an analysis of the various probe packet types for the purpose of measuring a stable round-trip time (RTT). We used the term “stable RTT” that means that every time we measure RTT, we can get the same value with minimal error, i.e., it possess a reproducibility characteristic. In initial experiment, we directly linked two computer running Linux OS and measured RTT using different probe packet types and in different parameters like packet size, inter-packet interval, and inter-packet train gap. Results show that varying the inter-packet interval affects the deviation of the delay distribution. This finding was attributed to the processing of probe packets at the network interface. Linux OS employs New Application Process Interface (NAPI) which operates in polling and interrupt modes; the rate of the incoming packets determines which mode NAPI operates. Without modification and tuning of the Linux OS, and just by carefully configuring the parameters of the probe packets, a highly stable RTT can be obtained. Furthermore, we present an experimental analysis on the RTT measured in a real network environment. Our laboratory hosts the server machine wherein several client computers located around Kanto area access the server. The server sends the probe packets to the client and the client returns the packet back to the server, thus RTT is measured. As the RTT distribution exhibits long-tail which is caused by cross traffic, a packet filtering mechanism that is based on packet arrival times was employed in order to get a stable RTT. The motivation behind achieving a stable RTT emerged after finding ways to enhance the authentication scheme for the New Digital Rights Management (DRM). The conventional authentication method uses username and password combination. However, this method pose a great deal of vulnerabilities especially that username and password can be guessed, forgotten, shared, or written down and subsequently lost or stolen. Moreover, it has also been reported that phishing attack is widely growing targeting service providers and financial institutions. Fraudulently acquired user information could then be used for spoofing. In our DRM system, we propose to enhance the authentication scheme by introducing a location-enforcement policy that is based on network location based on RTT. This policy ensures that access outside the permitted area is prohibited, thus spoofing could be prevented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Assessing Circuit Breaker’s Electrical Contact Condition through Dynamic Resistance Signature Using Fuzzy Classifier

Circuit Breakers (CBs) are critical components in power system for reliability and protection. To assure their accurate performance, a comprehensive condition assessment is of an imminent importance. Based on dynamic resistance measurement (DRM), this paper discusses a simple yet effective fuzzy approach for evaluating CB’s electrical contacts condition. According to 300 test results obta...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008