Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: Signature, Batch, Based, multicasting, multicast ip, wiki multicast, multicast wiki, multicast group address, multicast address, broadcast vs multicast, ipv4 multicast, ip multicast, unicast, multicast dns, linux multicast routing, iperf multicast, multicast rate, multicast addressing, iana multicast, multicast adress, multicast subnet, Authentication, Multicast, MABS, MABS Multicast Authentication Based on Batch Signature,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
22-03-2011, 11:16 AM
Post: #1
MABS: Multicast Authentication Based on Batch Signature

.doc  MABS Multicast Authentication Based On Batch Signature.doc (Size: 181 KB / Downloads: 642)
INTRODUCTION
1. Data integrity: Each receiver should be able to assure that received packets have not been modified during transmissions.
2. Data origin authentication: Each receiver should be able to assure that each received packet comes from the real sender as it claims.
3. No repudiation: The sender of a packet should not be able to deny sending the packet to receivers in case there is a dispute between the sender and receivers.
All the three services can be supported by an asymmetric key technique called signature. In an ideal case, the sender generates a signature for each packet with its private key, which is called signing, and each receiver checks the validity of the signature with the sender’s public key, which is called verifying. If the verification succeeds, the receiver knows the packet is authentic. Designing a multicast authentication protocol is not an easy task. Generally, there are following issues in real world challenging the design. First, efficiency needs to be considered, especially for receivers. Compared with the multicast sender, which could be a powerful server, receivers can have different capabilities and resources.
The receiver heterogeneity requires that the multicast authentication protocol be able to execute on not only powerful desktop computers but also resource-constrained mobile handsets. In particular, latency, computation, and communication overhead are major issues to be considered. Second, packet loss is inevitable. In the Internet, congestion at routers is a major reason causing packet loss. An overloaded router drops buffered packets according to its preset control policy. Though TCP provides a certain retransmission capability, multicast content is mainly transmitted over UDP, which does not provide any loss recovery support. In mobile environments, the situation is even worse.
The instability of wireless channel can cause packet loss very frequently. Moreover, the smaller data rate of wireless channel increases the congestion possibility. This is not desirable for applications like real-time online streaming or stock quotes delivering. End users of online streaming will start to complain if they experience constant service interruptions due to packet loss, and missing critical stock quotes can cause severe capital loss of service subscribers. Therefore, for applications where the quality of service is critical to end users, a multicast authentication protocol should provide a certain level of resilience to packet loss. Specifically, the impact of packet loss on the authenticity of the already-received packets should be as small as possible. Efficiency and packet loss resilience can hardly be supported simultaneously by conventional multicast schemes.
Existing System
Single cast authentication based batch signature related tool is available where the user can send the file without encrypting and decrypting the file. So here there will not be any security while the user is transforming the files in between different intermediate nodes. so user is looking for proposed system where more security is incorporated and adopted.
Proposed System
Here the data is encrypted and decrypted in the for of matrix and engineering. While data is decrypting in server side it is reverse engineering in the format of original data. So here digital signature is also verified and the receiver is multicasting by the sender so that the receiver can receive ‘N’ number of files at a time from different senders. So here we are enforcing the more security on the system.
Algorithms Used :
1. Core Resolution Algorithm - Encryption and Decryption
2. Batch RSA Algorithm - Bath Signature
3. Optimal MABS Router Protocol – File Transfer
Technology Used
1. Digital Certificate - Authentication and Authorization
HARDWARE SPECIFICATION:
Processor : Pentium-IV
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : Keyboard, Monitor, Mouse
SOFTWARE SPECIFICATION:
Operating System : Windows XP
Software : JAVA (JDK 1.6.0)
Protocol : TCP/IP
IDE : Eclipse
Front End : Java Swing
31-03-2011, 09:54 PM
Post: #2
RE: MABS: Multicast Authentication Based on Batch Signature
Where can i get source code for this project
09-04-2011, 11:03 AM
Post: #3
RE: MABS: Multicast Authentication Based on Batch Signature
Hi,

Can you Provide more information regarding the algorithms used in this project



Thanks & Regards,

Rajesh
09-04-2011, 01:11 PM
Post: #4
RE: MABS: Multicast Authentication Based on Batch Signature
do you downloaded the attachment from the top post ?

Please Use Search http://seminarprojects.com/search.php wisely To Get More Information About A Seminar Or Project Topic
12-04-2011, 11:16 PM
Post: #5
RE: MABS: Multicast Authentication Based on Batch Signature
i want MABS information like ppt
15-04-2011, 10:52 AM
Post: #6
Thumbs Up RE: MABS: Multicast Authentication Based on Batch Signature
hi, where i can get code for this project... Plez help me....
15-04-2011, 11:25 AM
Post: #7
RE: MABS: Multicast Authentication Based on Batch Signature
Please provide me the source code for this project.
30-06-2011, 03:11 PM
Post: #8
RE: MABS: Multicast Authentication Based on Batch Signature
can u post me the code and project report of this topic.......
02-07-2011, 10:18 AM
Post: #9
RE: MABS: Multicast Authentication Based on Batch Signature
Hi you can see details of MABS: Multicast Authentication Based on Batch Signature in these pages
http://www.seminarprojects.com/attachment.php?aid=10717
10-07-2011, 12:31 PM
Post: #10
RE: MABS: Multicast Authentication Based on Batch Signature
Can anyone help me with the ppt of this project. I have done this on Dot net platform..
11-07-2011, 11:27 AM
Post: #11
RE: MABS: Multicast Authentication Based on Batch Signature
you can refer these page details of"Multicast Authentication Based on Batch Signature"

http://www.seminarprojects.com/Thread-ma...-signature
14-09-2011, 04:56 PM
Post: #12
RE: MABS: Multicast Authentication Based on Batch Signature
i need multi cast authentication based on digital signature using blow fish algorithm
15-09-2011, 09:28 AM
Post: #13
RE: MABS: Multicast Authentication Based on Batch Signature
you can refer these page details of"Multicast Authentication Based on Batch Signature"

http://www.seminarprojects.com/Thread-ma...-signature
20-09-2011, 04:48 PM
Post: #14
RE: MABS: Multicast Authentication Based on Batch Signature
need a full project report on based on this project
21-09-2011, 09:36 AM
Post: #15
RE: MABS: Multicast Authentication Based on Batch Signature
you can refer these page details of"Multicast Authentication Based on Batch Signature"

http://www.seminarprojects.com/Thread-ma...-signature
29-02-2012, 10:06 AM
Post: #16
RE: MABS: Multicast Authentication Based on Batch Signature
to get information about the topic multicast authentication based on batch signature full report refer the link bellow

http://seminarprojects.com/Thread-mabs-m...-signature
23-11-2012, 01:09 AM
Post: #17
RE: MABS: Multicast Authentication Based on Batch Signature
pls provide multicast authentication Based on Batch Signature documentation in dotnet
04-01-2013, 08:04 PM
Post: #18
RE: MABS: Multicast Authentication Based on Batch Signature
Pls send the mabs :multicast authentication based on batch signature algorithm abstract , specification and literature review
05-01-2013, 10:12 AM
Post: #19
RE: MABS: Multicast Authentication Based on Batch Signature
to get information about the topic "Multicast Authentication Based on Batch Signature" related topic refer the link bellow

http://seminarprojects.com/Thread-mabs-m...-signature
06-08-2013, 02:19 PM
Post: #20
RE: MABS: Multicast Authentication Based on Batch Signature
MABS: Multicast Authentication Based on Batch Signature


.pdf  Multicast Authentication.pdf (Size: 2.03 MB / Downloads: 35)

Abstract

Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender
choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the
signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them
vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service (DoS)
resilience renders most of them vulnerable to packet injection in hostile environments. In this paper, we propose a novel multicast
authentication protocol, namely MABS, including two schemes. The basic scheme (MABS-B) eliminates the correlation among packets
and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication
overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets
simultaneously. We also present an enhanced scheme MABS-E, which combines the basic scheme with a packet filtering mechanism
to alleviate the DoS impact while preserving the perfect resilience to packet loss.

INTRODUCTION

[1] is an efficient method to deliver multi-
media content from a sender to a group of receivers
and is gaining popular applications such as realtime stock
quotes, interactive games, video conference, live video
broadcast, or video on demand. Authentication is one of
the critical topics in securing multicast [2], [3], [4], [5], [6],
[7] in an environment attractive to malicious attacks.
Basically.

RELATED WORK

Schemes in [8], [9] follow the ideal approach of signing and
verifying each packet individually, but reduce the compu-
tation overhead at the sender by using one-time signatures
[8] or k-time signatures [9]. They are suitable for RSA [33],
which is expensive on signing while cheap on verifying. For
each packet, however, each receiver needs to perform one
more verification on its one-time or k-time signature plus
one ordinary signature verification. Moreover, the length of
one-time signature is too long (on the order of 1,000 bytes).
Tree chaining was proposed in [10], [11] by constructing
a tree for a block of packets. The root of the tree is signed by
the sender. Each packet carries the signed root and multiple
hashes. When each receiver receives one packet in the block,
it uses the authentication information in the packet to
authenticate it. The buffered authentication information is
further used to authenticate other packets in the same block.
Without the buffered authentication information, each
packet is independently verifiable at a cost of per-packet
signature verification.

BASIC SCHEME

Our target is to authenticate multicast streams from a sender
to multiple receivers. Generally, the sender is a powerful
multicast server managed by a central authority and can be
trustful. The sender signs each packet with a signature and
transmits it to multiple receivers through a multicast routing
protocol. Each receiver is a less powerful device with resource
constraints and may be managed by a nontrustworthy
person. Each receiver needs to assure that the received
packets are really from the sender (authenticity) and the
sender cannot deny the signing operation (nonrepudiation)
by verifying the corresponding signatures.

Requirements to the Sender

In most RSA implementations, the public key e is usually
small (e 1⁄4 3 for instance) while the private key d is large.
Therefore, the RSA signature verification is efficient while
the signature generation is expensive. This poses a
challenge to the computation capability of the sender
because the sender needs to sign each packet. Choosing a
small private key d can improve the computation efficiency
but compromise the security. If the sender does not have
enough resource, a pair of fe; dg with comparable sizes can
achieve a certain level of trade-off between computation
efficiency and security at the sender part. If the sender is a
powerful server, then signing each packet can be affordable
in this scenario. Next, we propose two efficient batch
signature schemes based on BLS [36] and DSA [38], which
can reduce the computation complexity at the sender.

Batch DSA Signature

DSA [38] is another popular digital signature algorithm.
Unlike RSA, which is based on the hardness of factoring
two large primes, DSA is deemed secure based on the
difficulty of solving DLP [39]. A batch DSA signature
scheme was proposed in [40], but later was found insecure
[41]. Harn improved the security of [40] in [42], [43].
Unfortunately, Boyd and Pavlovski pointed out in [44] that
Harn’s work is still vulnerable to malicious attacks. Here,
we propose a batch DSA scheme based on Harn’s work and
counteract the attack described in [44].

Comparisons of Signature Schemes

We compare the computation overhead of three batch
signature schemes in Table 4. RSA [33] and BLS [36] require
one modular exponentiation at the sender and DSA [38]
requires two modular multiplications when r value is
computed offline. Therefore, we can estimate that
the computation overhead of one 1,024-bit RSA signing
operation is roughly equivalent to that of 768 DSA signing
operations (1,536 modular multiplications) and that of
6 BLS signing operations (each one is corresponding to
255 modular multiplications).

CONCLUSIONS

To reduce the signature verification overheads in the secure
multimedia multicasting, block-based authentication
schemes have been proposed. Unfortunately, most previous
schemes have many problems such as vulnerability to
packet loss and lack of resilience to denial of service (DoS)
attack. To overcome these problems, we develop a novel
authentication scheme MABS. We have demonstrated that
MABS is perfectly resilient to packet loss due to the
elimination of the correlation among packets and can
effectively deal with DoS attack. Moreover, we also show
that the use of batch signature can achieve the efficiency less
than or comparable with the conventional schemes. Finally,
we further develop two new batch signature schemes based
on BLS and DSA, which are more efficient than the batch
RSA signature scheme.
Rating MABS: Multicast Authentication Based on Batch Signature Options
Share MABS: Multicast Authentication Based on Batch Signature To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : mabs project, multicast authentication, batch rsa algorithm, base paper for multicast authentication based on batch signature, multicast authentication ppt, mabs multicast authentication based on batch signature ppt for download, mabs multicast authentication based on batch signature ppt, slides of multicast authentication based on batch signature, slides on multicast authentication based on batch signature, multicast authentication using batch signature ppt, mabs multicast authentication based on batch signature, multicast authentication based on batch signature ppt, multicast authentication based on batch signature, mabs multicast authentication ppt,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  LI-FI BASED AUDIO COMMUNICATION ,DATA TRANSFER AND DEVICE SWITCHING mkaasees 0 0 Yesterday 02:29 PM
Last Post: mkaasees
  Modelling a Java Ring based implementation of the N-Count payment system mkaasees 0 0 Yesterday 11:59 AM
Last Post: mkaasees
  Decentralized Access Control With Anonymous Authentication Of Data Stored In Clouds mkaasees 0 0 Yesterday 11:14 AM
Last Post: mkaasees
  SURVEY on Secured Online Authentication and Defence Technique against 3rd Party Human mkaasees 0 0 23-09-2016 03:38 PM
Last Post: mkaasees
  A CABAC based HEVCc video steganography algorithm without bitrate increase mkaasees 0 0 23-09-2016 11:54 AM
Last Post: mkaasees
  Semantic Based Automated Service Discovery mkaasees 0 0 22-09-2016 12:40 PM
Last Post: mkaasees
  Latent Fingerprint Enhancement via Multi-Scale Patch Based Sparse Representation mkaasees 0 0 22-09-2016 12:33 PM
Last Post: mkaasees
  IR T.V REMOTE BASED COMPUTER AND LAPTOP OPERATING mkaasees 0 0 22-09-2016 12:00 PM
Last Post: mkaasees
  WEB BASED SUBSTATION MONITORING AND PROTECTION AND CONTROL mkaasees 0 0 22-09-2016 10:24 AM
Last Post: mkaasees
  Encrypted image-based reversible data hiding with public key cryptography from differ mkaasees 0 0 20-09-2016 04:25 PM
Last Post: mkaasees
This Page May Contain What is MABS: Multicast Authentication Based on Batch Signature And Latest Information/News About MABS: Multicast Authentication Based on Batch Signature ,If Not ...Use Search to get more info about MABS: Multicast Authentication Based on Batch Signature Or Ask Here

Options: