Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol1

被引:0
|
作者
Choi, Seonho [1 ]
Eom, Hyeonsang [2 ]
Jung, Edward [3 ]
机构
[1] Bowie State Univ, Dept Comp Sci, Bowie, MD 20715 USA
[2] Seoul Natl Univ, Sch Engn & Comp Sci, Seoul, South Korea
[3] Southern Polytech Univ, Sch Comp & SE, Marietta, GA 30067 USA
关键词
denial of service; network protocol; authentication; multicast; resource requirement; cryptographic hashing; simulation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 51 It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platform independent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.
引用
收藏
页码:196 / 201
页数:6
相关论文
共 50 条
  • [1] Resource requirement analysis for a predictive-hashing based multicast authentication protocol
    Choi, Seonho
    Kim, Yanggon
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 302 - 311
  • [2] Automated parameter selection algorithm for predictive-hashing based multicast authentication protocol
    Choi, Seonho
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2006, : 59 - 64
  • [3] Simulation-Based Performance Evaluation of the MLSD Protocol for Infrastructure WMNs
    Elias, Gledson
    Porto, Daniel
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 297 - 304
  • [4] Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs
    Elias, Gledson
    Novaes, Mateus
    Cavalcanti, Gustavo
    Porto, Daniel
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 90 - 97
  • [5] Simulation-based 'STRESS' testing case study: A multicast routing protocol
    Helmy, A
    Estrin, D
    SIXTH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 1998, : 36 - 43
  • [6] Evaluation of a simulation-based curriculum clinical protocol
    Marzano, David
    Smith, Roger
    Mhyre, Jill M.
    Seagull, F. Jacob
    Curran, Diana
    Behrmann, Sydney
    Priessnitz, Kristina
    Hammoud, Maya
    INTERNATIONAL JOURNAL OF GYNECOLOGY & OBSTETRICS, 2016, 135 (03) : 333 - 337
  • [7] Simulation-based performance evaluation of model predictive control for building energy systems
    Huang, Sen
    Lin, Yashen
    Chinde, Venkatesh
    Ma, Xu
    Lian, Jianming
    APPLIED ENERGY, 2021, 281
  • [8] Simulation-based performance analysis of multicast transmissions in an 802.11 g WLAN
    Cocorada, Sorin
    Szekely, Iuliu
    ISSCS 2007: INTERNATIONAL SYMPOSIUM ON SIGNALS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2007, : 353 - +
  • [9] Simulation-Based Performance Evaluation of Cloud Applications
    Cuomo, Antonio
    Rak, Massimiliano
    Villano, Umberto
    INTELLIGENT DISTRIBUTED COMPUTING VI, 2013, 446 : 263 - 269
  • [10] Simulation-Based Evaluation of Predictive Tracking for Sorting Bulk Materials
    Pfaff, Florian
    Pieper, Christoph
    Maier, Georg
    Noack, Benjamin
    Kruggel-Emden, Harald
    Gruna, Robin
    Hanebeck, Uwe D.
    Wirtz, Siegmar
    Scherer, Viktor
    Laengle, Thomas
    Beyerer, Juergen
    2016 IEEE INTERNATIONAL CONFERENCE ON MULTISENSOR FUSION AND INTEGRATION FOR INTELLIGENT SYSTEMS (MFI), 2016, : 511 - 516