ABSTRACT
Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient stream loss-tolerant authentication (TESLA), a method for achieving multigrade authentication in multicast scenarios that reduces the delay needed to filter forged multicast packets and, consequently, mitigates the effects of DoS attacks. Staggered TESLA involves modifications to the popular multicast authentication scheme, TESLA, by incorporating the notion of multilevel trust through the use of multiple, staggered authentication keys in creating message authentication codes (MACs) for a multicast packet. We provide guidelines for determining the appropriate buffer size, and show that the use of multiple MACs and, hence, multiple grades of authentication, allows the receiver to flush forged packets quicker than in conventional TESLA. As a result, staggered TESLA provides an advantage against DoS attacks compared to conventional TESLA. We then examine two new strategies for reducing the time needed for complete authentication. In the first strategy, the multicast source uses assurance of the trustworthiness of entities in a neighborhood of the source, in conjunction with the multigrade authentication provided by staggered TESLA. The second strategy achieves reduced delay by introducing additional key distributors in the network.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
1.2 STATE OF THE PROBLEM
1.3 PURPOSE OF THE STUDY
1.4 AIMS AND OBJECTIVES
1.5 SCOPE OF STUDY
1.6 LIMITATIONS OF STUDY
1.7 ASSUMPTIONS
1.8 DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
CHAPTER THREE
3.1 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2 FACT FINDING METHOD USED
3.3 ORGANIZATION STRUCTURE
3.4 OBJECTIVES OF EXISTING SYSTEM
3.5 INPUT, PROCESS AND OUTPUT ANALYSIS
3.6 INFORMATION FLOW DIAGRAMS
3.7 PROBLEMS OF THE EXISTING SYSTEM
3.8 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
4.1 DESIGN OF THE NEW SYSTEM
4.2 INPUT SPECIFICATION AND DESIGN
4.3 OUTPUT SPECIFICATION AND DESIGN
4.4 FILE DESIGN
4.5 PROCEDURE CHART
4.6 SYSTEM FLOW CHART
4.6.1 SYSTEM REQUIREMENTS
4.7 IMPLEMENTATION
4.7.1 PROGRAM DESIGN
4.7.2 PROGRAM FLOWCHART
4.7.3 PSEUDO CODE
4.7.4 SOURCE PROGRAM: TEST RUN
CHAPTER FIVE
5.0 DOCUMENTATION
5.1 RECOMMENDATION
5.2 CONCLUSION
BIBLIOGRAPHY
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 08). Reducing Delay And Enhancing Dos Resistance In Multicast Authentication Through Multigrade Security (case Study Of Pressure World Cafee ).. ProjectStoc.com. Retrieved 08, 2014, from https://projectstoc.com/read/2779/reducing-delay-and-enhancing-dos-resistance-in-multicast-authentication-through-multigrade-security-case-study-of-pressure-world-cafee-5490
"Reducing Delay And Enhancing Dos Resistance In Multicast Authentication Through Multigrade Security (case Study Of Pressure World Cafee )." ProjectStoc.com. 08 2014. 2014. 08 2014 <https://projectstoc.com/read/2779/reducing-delay-and-enhancing-dos-resistance-in-multicast-authentication-through-multigrade-security-case-study-of-pressure-world-cafee-5490>.
"Reducing Delay And Enhancing Dos Resistance In Multicast Authentication Through Multigrade Security (case Study Of Pressure World Cafee ).." ProjectStoc.com. ProjectStoc.com, 08 2014. Web. 08 2014. <https://projectstoc.com/read/2779/reducing-delay-and-enhancing-dos-resistance-in-multicast-authentication-through-multigrade-security-case-study-of-pressure-world-cafee-5490>.
"Reducing Delay And Enhancing Dos Resistance In Multicast Authentication Through Multigrade Security (case Study Of Pressure World Cafee ).." ProjectStoc.com. 08, 2014. Accessed 08, 2014. https://projectstoc.com/read/2779/reducing-delay-and-enhancing-dos-resistance-in-multicast-authentication-through-multigrade-security-case-study-of-pressure-world-cafee-5490.
- Related Works
- Design And Implementation Of Web Enabled Supply Chain Management A Case Study Of Emenite Plc Enugu
- Design And Implementation Of Parallel Processing Implementation Of The Mandelbrot Set On Gpu For Online Payment (case Study Of Imt Enugu)
- Design And Implementation Of An On-line Lan Knowledge-based System
- Online Student Admission System (case Study Of Enugu State College Of Education Technical- Escet)
- The Use Of Computer In Management Information System In Secondary Schools In Enugu Education Zone
- Design And Implementation Of Telecom Inventory Maintenance And Application Installer With Error Tracking (a Case Study Of Globacom Enugu Branch)
- Java Network File Sharing System
- Design And Implementation Of Computerized Information System For Small Business Enterprise (a Case Study Of Enugu Urban)
- Remote Pc Access In Cyber Cafe (case Study Of Pressure World Cafe )
- Design And Implementation Of Protocol Scrubbing: Network Security Through Transparent Flow Modification