Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
International Institute of Informatics and Cybernetics
2012-12-01
|
Series: | Journal of Systemics, Cybernetics and Informatics |
Subjects: | |
Online Access: | http://www.iiisci.org/Journal/CV$/sci/pdfs/HCT574UZ.pdf
|
id |
doaj-84e932322608475b933b7b45c5d4f763 |
---|---|
record_format |
Article |
spelling |
doaj-84e932322608475b933b7b45c5d4f7632020-11-24T22:59:02ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242012-12-011061924Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication ProtocolSeonho Choi0Hyeonsang Eom1Edward Jung2 Bowie State University Seoul National University Southern Polytechnic University A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.http://www.iiisci.org/Journal/CV$/sci/pdfs/HCT574UZ.pdf MulticastResource RequirementDenial Of ServiceCryptographic HashingSimulationNetwork ProtocolAuthentication |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Seonho Choi Hyeonsang Eom Edward Jung |
spellingShingle |
Seonho Choi Hyeonsang Eom Edward Jung Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol Journal of Systemics, Cybernetics and Informatics Multicast Resource Requirement Denial Of Service Cryptographic Hashing Simulation Network Protocol Authentication |
author_facet |
Seonho Choi Hyeonsang Eom Edward Jung |
author_sort |
Seonho Choi |
title |
Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol |
title_short |
Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol |
title_full |
Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol |
title_fullStr |
Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol |
title_full_unstemmed |
Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol |
title_sort |
simulation-based performance evaluation of predictive-hashing based multicast authentication protocol |
publisher |
International Institute of Informatics and Cybernetics |
series |
Journal of Systemics, Cybernetics and Informatics |
issn |
1690-4524 |
publishDate |
2012-12-01 |
description |
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams. |
topic |
Multicast Resource Requirement Denial Of Service Cryptographic Hashing Simulation Network Protocol Authentication |
url |
http://www.iiisci.org/Journal/CV$/sci/pdfs/HCT574UZ.pdf
|
work_keys_str_mv |
AT seonhochoi simulationbasedperformanceevaluationofpredictivehashingbasedmulticastauthenticationprotocol AT hyeonsangeom simulationbasedperformanceevaluationofpredictivehashingbasedmulticastauthenticationprotocol AT edwardjung simulationbasedperformanceevaluationofpredictivehashingbasedmulticastauthenticationprotocol |
_version_ |
1725645795780198400 |