Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS...

Full description

Bibliographic Details
Main Authors: Seonho Choi, Hyeonsang Eom, Edward Jung
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2012-12-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/HCT574UZ.pdf
id doaj-84e932322608475b933b7b45c5d4f763
record_format Article
spelling doaj-84e932322608475b933b7b45c5d4f7632020-11-24T22:59:02ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242012-12-011061924Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication ProtocolSeonho Choi0Hyeonsang Eom1Edward Jung2 Bowie State University Seoul National University Southern Polytechnic University A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.http://www.iiisci.org/Journal/CV$/sci/pdfs/HCT574UZ.pdf MulticastResource RequirementDenial Of ServiceCryptographic HashingSimulationNetwork ProtocolAuthentication
collection DOAJ
language English
format Article
sources DOAJ
author Seonho Choi
Hyeonsang Eom
Edward Jung
spellingShingle Seonho Choi
Hyeonsang Eom
Edward Jung
Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol
Journal of Systemics, Cybernetics and Informatics
Multicast
Resource Requirement
Denial Of Service
Cryptographic Hashing
Simulation
Network Protocol
Authentication
author_facet Seonho Choi
Hyeonsang Eom
Edward Jung
author_sort Seonho Choi
title Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol
title_short Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol
title_full Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol
title_fullStr Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol
title_full_unstemmed Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol
title_sort simulation-based performance evaluation of predictive-hashing based multicast authentication protocol
publisher International Institute of Informatics and Cybernetics
series Journal of Systemics, Cybernetics and Informatics
issn 1690-4524
publishDate 2012-12-01
description A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.
topic Multicast
Resource Requirement
Denial Of Service
Cryptographic Hashing
Simulation
Network Protocol
Authentication
url http://www.iiisci.org/Journal/CV$/sci/pdfs/HCT574UZ.pdf
work_keys_str_mv AT seonhochoi simulationbasedperformanceevaluationofpredictivehashingbasedmulticastauthenticationprotocol
AT hyeonsangeom simulationbasedperformanceevaluationofpredictivehashingbasedmulticastauthenticationprotocol
AT edwardjung simulationbasedperformanceevaluationofpredictivehashingbasedmulticastauthenticationprotocol
_version_ 1725645795780198400