Multicast Authentication using Batch Signature - MABS
نویسنده
چکیده
Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: Choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends to packet loss which is very common via internet and wireless communication. For which we are going to propose novel multicast authentication protocol called MABS (Multicast Authentication Based on Batch Signature) by including two specified schemes MABS-B and MABS-E. Where MABS-B reduces the packet loss by eliminating the relationship between packets ,and due to its efficient cryptographic primitive called batch signature it provides efficient latency, computation and communication overhead .Where MABS-E improve the Dos impact by combining the basic scheme with a packet filtering mechanism while preserving the perfect resilience to packet loss. Keyword – MBAS, Schemes, Digital Signature, Packets, Authentication.
منابع مشابه
Comparison analysis in Multicast Authentication based on Batch Signature (MABS) in Network Security
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to pack...
متن کاملEfficient Multicast Packet Authentication Using Signature
The multicast authentication protocol namely MABS including two schemes MABS-B and MABS-E. The basic scheme (MABS-B) eliminates packet loss and also efficient in terms of latency computation and communication overhead due to effective cryptographic primitive called batch signature which authenticates any number of packets simultaneously. This paper deals with the enhanced scheme (MABS-E) which ...
متن کاملAgent Based Secure Multicast Authentication on Wireless Network
Conventional key based authentication system normally associated with block cipher and allows the sender to send the packets with signature scheme. The relationship between the packets makes them vulnerable to packet loss, which is inherent in the internet and wireless networks. In addition, the lack of Denial of Service (DOS) resilience renders most of them vulnerable to packet injection in th...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملAchieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast authentication protocol. Our construction will exhibit three main advantages. First, our packe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011