MABS: Multicast Authentication Based on Batch Signature
#1

[attachment=10717]
INTRODUCTION
1. Data integrity: Each receiver should be able to assure that received packets have not been modified during transmissions.
2. Data origin authentication: Each receiver should be able to assure that each received packet comes from the real sender as it claims.
3. No repudiation: The sender of a packet should not be able to deny sending the packet to receivers in case there is a dispute between the sender and receivers.
All the three services can be supported by an asymmetric key technique called signature. In an ideal case, the sender generates a signature for each packet with its private key, which is called signing, and each receiver checks the validity of the signature with the sender’s public key, which is called verifying. If the verification succeeds, the receiver knows the packet is authentic. Designing a multicast authentication protocol is not an easy task. Generally, there are following issues in real world challenging the design. First, efficiency needs to be considered, especially for receivers. Compared with the multicast sender, which could be a powerful server, receivers can have different capabilities and resources.
The receiver heterogeneity requires that the multicast authentication protocol be able to execute on not only powerful desktop computers but also resource-constrained mobile handsets. In particular, latency, computation, and communication overhead are major issues to be considered. Second, packet loss is inevitable. In the Internet, congestion at routers is a major reason causing packet loss. An overloaded router drops buffered packets according to its preset control policy. Though TCP provides a certain retransmission capability, multicast content is mainly transmitted over UDP, which does not provide any loss recovery support. In mobile environments, the situation is even worse.
The instability of wireless channel can cause packet loss very frequently. Moreover, the smaller data rate of wireless channel increases the congestion possibility. This is not desirable for applications like real-time online streaming or stock quotes delivering. End users of online streaming will start to complain if they experience constant service interruptions due to packet loss, and missing critical stock quotes can cause severe capital loss of service subscribers. Therefore, for applications where the quality of service is critical to end users, a multicast authentication protocol should provide a certain level of resilience to packet loss. Specifically, the impact of packet loss on the authenticity of the already-received packets should be as small as possible. Efficiency and packet loss resilience can hardly be supported simultaneously by conventional multicast schemes.
Existing System
Single cast authentication based batch signature related tool is available where the user can send the file without encrypting and decrypting the file. So here there will not be any security while the user is transforming the files in between different intermediate nodes. so user is looking for proposed system where more security is incorporated and adopted.
Proposed System
Here the data is encrypted and decrypted in the for of matrix and engineering. While data is decrypting in server side it is reverse engineering in the format of original data. So here digital signature is also verified and the receiver is multicasting by the sender so that the receiver can receive ‘N’ number of files at a time from different senders. So here we are enforcing the more security on the system.
Algorithms Used :
1. Core Resolution Algorithm - Encryption and Decryption
2. Batch RSA Algorithm - Bath Signature
3. Optimal MABS Router Protocol – File Transfer
Technology Used
1. Digital Certificate - Authentication and Authorization
HARDWARE SPECIFICATION:
Processor : Pentium-IV
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : Keyboard, Monitor, Mouse
SOFTWARE SPECIFICATION:
Operating System : Windows XP
Software : JAVA (JDK 1.6.0)
Protocol : TCP/IP
IDE : Eclipse
Front End : Java Swing
Reply
#2
Where can i get source code for this project
Reply
#3
Hi,

Can you Provide more information regarding the algorithms used in this project



Thanks & Regards,

Rajesh
Reply
#4
do you downloaded the attachment from the top post ?
Reply
#5
i want MABS information like ppt
Reply
#6
Thumbs Up 
hi, where i can get code for this project... Plez help me....
Reply
#7
Please provide me the source code for this project.
Reply
#8
can u post me the code and project report of this topic.......
Reply
#9
Hi you can see details of MABS: Multicast Authentication Based on Batch Signature in these pages
http://seminarsprojects.in/attachment.php?aid=10717
Reply
#10
Can anyone help me with the ppt of this project. I have done this on Dot net platform..

Reply
#11
you can refer these page details of"Multicast Authentication Based on Batch Signature"

http://studentbank.in/report-mabs-multic...-signature
Reply
#12
i need multi cast authentication based on digital signature using blow fish algorithm
Reply
#13
you can refer these page details of"Multicast Authentication Based on Batch Signature"

http://studentbank.in/report-mabs-multic...-signature
Reply
#14
need a full project report on based on this project
Reply
#15
you can refer these page details of"Multicast Authentication Based on Batch Signature"

http://studentbank.in/report-mabs-multic...-signature
Reply
#16

to get information about the topic multicast authentication based on batch signature full report refer the page link bellow

http://studentbank.in/report-mabs-multic...-signature
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: image compression batch, mabs multicast authentication based on batch signature ppt for download, brute force attack algorithm with code in batch, data flow diagram for multicast authentication on batch signatures, download multicast authentication ppts, mabs multicast authentication based on batch signature voice videos, performance testing batch jobs,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 19 18,486 26-04-2017, 03:38 PM
Last Post: jaseela123d
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,822 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 3,224 26-04-2013, 01:58 PM
Last Post: Guest
  Stateless Multicast Protocol for Ad Hoc Networks Projects9 1 1,324 29-11-2012, 01:06 PM
Last Post: seminar details
  Signature Verification nit_cal 2 2,536 24-10-2012, 01:27 PM
Last Post: seminar details
  Improved Offline Signature Verification Scheme Using Feature Point Extra ction Method seminar class 1 3,079 24-10-2012, 01:27 PM
Last Post: seminar details
  Project Report on IPAS: Implicit Password Authentication System computer girl 0 2,101 08-06-2012, 11:27 AM
Last Post: computer girl
  ZIGBEE WIRELESS VEHICLE IDENTIFICATION AND AUTHENTICATION SYSTEM full report project topics 11 7,796 13-03-2012, 11:06 AM
Last Post: seminar paper
  EFFICIENT RESOURCE ALLOCATION FOR WIRELESS MULTICAST - MOBILE COMPUTING electronics seminars 5 4,576 15-02-2012, 02:25 PM
Last Post: seminar paper
  Autonomic Placement of Mixed Batch and Transactional Workloads Projects9 0 693 23-01-2012, 05:13 PM
Last Post: Projects9

Forum Jump: