Reducing Delay and Enhancing DoSResistance in Multicast Authentication Through Multig
#1

Reducing Delay and Enhancing DoSResistance in Multicast Authentication
Through Multigrade Security

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 2,
Language java

Abstract—
Many techniques for multicast authentication employethe principle of delayed key disclosure. These methods introducedelay in authentication, employ receiver-side buffers, and are susceptibleto denial-of-service (DoS) attacks. Delayed key disclosureschemes have a binary concept of authentication and do not incorporate
any notion of partial trust. This paper introduces staggeredtimed efficient stream loss-tolerant authentication (TESLA), amethod for achieving multigrade authentication in multicastscenarios that reduces the delay needed to filter forged multicastpackets and, consequently, mitigates the effects of DoS attacks.Staggered TESLA involves modifications to the popular multicastauthentication scheme, TESLA, by incorporating the notion of
multilevel trust through the use of multiple, staggered authenticationkeys in creating message authentication codes (MACs) fora multicast packet. We provide guidelines for determining theappropriate buffer size, and show that the use of multiple MACsand, hence, multiple grades of authentication, allows the receiverto flush forged packets quicker than in conventional TESLA. Asa result, staggered TESLA provides an advantage against DoSattacks compared to conventional TESLA. We then examine twonew strategies for reducing the time needed for complete authentication.In the first strategy, the multicast source uses assuranceofthetrustworthiness of entities in a neighborhood of the source,in conjunction with themultigradeauthenticationprovidedbystaggered TESLA. The second strategy achieves reduced delay byintroducing additional key distributors in the network
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dns method reducing, power reducing mechanism, interference reducing in gsm8, power reducing mechanism**il language, java coding for multicast authentication, reducing torque in simulink, sound reducing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 19 18,623 26-04-2017, 03:38 PM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,082 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention 1 797 15-02-2017, 03:24 PM
Last Post: jaseela123d
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,845 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Adaptive Forwarding Delay Control for VANET Data Aggregation Projects9 2 1,744 18-03-2014, 11:25 PM
Last Post: seminar report asees
  Conditional Shortest Path Routing in Delay Tolerant Networks seminar class 5 3,697 18-01-2013, 03:06 PM
Last Post: Guest
  CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks project topics 2 2,982 02-01-2013, 10:25 AM
Last Post: seminar details
  Stateless Multicast Protocol for Ad Hoc Networks Projects9 1 1,340 29-11-2012, 01:06 PM
Last Post: seminar details
  application projects in java and vb.net (titles and topics) project topics 1 5,504 28-11-2012, 01:11 PM
Last Post: seminar details
  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs project report tiger 1 1,822 09-11-2012, 12:02 PM
Last Post: seminar details

Forum Jump: