REDUCING DELAY AND ENHANCING DOS RESISTANCE IN MULTICAST AUTHENTICATION THROUGH MULTIGRADE SECURITY (CASE STUDY OF PRESSURE WORLD CAFEE )

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2382
  • Access Fee: ₦5,000 ($14)
  • Pages: 41 Pages
  • Format: Microsoft Word
  • Views: 356
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
ABSTRACT
Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient stream loss-tolerant authentication (TESLA), a method for achieving multigrade authentication in multicast scenarios that reduces the delay needed to filter forged multicast packets and, consequently, mitigates the effects of DoS attacks. Staggered TESLA involves modifications to the popular multicast authentication scheme, TESLA, by incorporating the notion of multilevel trust through the use of multiple, staggered authentication keys in creating message authentication codes (MACs) for a multicast packet. We provide guidelines for determining the appropriate buffer size, and show that the use of multiple MACs and, hence, multiple grades of authentication, allows the receiver to flush forged packets quicker than in conventional TESLA. As a result, staggered TESLA provides an advantage against DoS attacks compared to conventional TESLA. We then examine two new strategies for reducing the time needed for complete authentication. In the first strategy, the multicast source uses assurance of the trustworthiness of entities in a neighborhood of the source, in conjunction with the multigrade authentication provided by staggered TESLA. The second strategy achieves reduced delay by introducing additional key distributors in the network.

TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS

CHAPTER ONE
INTRODUCTION
1.1BACKGROUND OF THE STUDY
1.2STATE OF THE PROBLEM
1.3PURPOSE OF THE STUDY
1.4AIMS AND OBJECTIVES
1.5SCOPE OF STUDY
1.6LIMITATIONS OF STUDY
1.7ASSUMPTIONS
1.8DEFINITION OF TERMS

CHAPTER TWO
LITERATURE REVIEW

CHAPTER THREE
3.1DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.2FACT FINDING METHOD USED
3.3ORGANIZATION STRUCTURE
3.4OBJECTIVES OF EXISTING SYSTEM
3.5INPUT, PROCESS AND OUTPUT ANALYSIS
3.6INFORMATION FLOW DIAGRAMS
3.7PROBLEMS OF THE EXISTING SYSTEM
3.8JUSTIFICATION OF THE NEW SYSTEM

CHAPTER FOUR
4.1DESIGN OF THE NEW SYSTEM
4.2INPUT SPECIFICATION AND DESIGN
4.3OUTPUT SPECIFICATION AND DESIGN
4.4FILE DESIGN
4.5PROCEDURE CHART
4.6SYSTEM FLOW CHART
4.6.1 SYSTEM REQUIREMENTS
4.7IMPLEMENTATION
4.7.1PROGRAM DESIGN
4.7.2PROGRAM FLOWCHART
4.7.3PSEUDO CODE
4.7.4SOURCE PROGRAM: TEST RUN

CHAPTER FIVE
5.0DOCUMENTATION
5.1RECOMMENDATION
5.2CONCLUSION
BIBLIOGRAPHY
REDUCING DELAY AND ENHANCING DOS RESISTANCE IN MULTICAST AUTHENTICATION THROUGH MULTIGRADE SECURITY (CASE STUDY OF PRESSURE WORLD CAFEE )
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2382
  • Access Fee: ₦5,000 ($14)
  • Pages: 41 Pages
  • Format: Microsoft Word
  • Views: 356
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU2382
    Fee ₦5,000 ($14)
    No of Pages 41 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading
    ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading
    ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment... Continue Reading
    ABSTRACT IP multicast is facing a slow take-off although it has been a hotly debated topic for more than a decade. Many reasons are responsible for this status. Hence, the Internet is likely to be organized with both unicast and multicast enabled networks. Thus, it is of utmost importance to design protocols that allow the progressive deployment... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT This work describes the design and implementation of protocol scrubbers. Protocol scrubbers are transparent, active interposition mechanisms for explicitly removing network scans and attacks at various protocol layers. The transport scrubber supports downstream passive network-based intrusion detection systems by converting ambiguous... Continue Reading
    ABSTRACT Remote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing... Continue Reading
    ABSTRACT Remote pc access are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing... Continue Reading
    ABSTRACT Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications include video-conferencing, distributed database replication, and online games. This type of application requires a multicasting subnetwork, using which messages... Continue Reading
    ABSTRACT Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications include video-conferencing, distributed database replication, and online games. This type of application requires a multicasting subnetwork, using which messages... Continue Reading
    Call Us
    whatsappWhatsApp Us