
Basic Model of Multicast Authentication Based On Batch Signature-MABS
Author(s) -
Hilda C.P,
Liaqat Ali Khan,
M.Grace Vennice
Publication year - 2013
Publication title -
international journal of computer science and informatics
Language(s) - English
Resource type - Journals
ISSN - 2231-5292
DOI - 10.47893/ijcsi.2013.1086
Subject(s) - multicast , computer science , computer network , source specific multicast , xcast , network packet , protocol independent multicast , authentication (law) , overhead (engineering) , distributed computing , computer security , operating system
Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: Choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends to packet loss which is very common via internet and wireless communication. For which we are going to propose novel multicast authentication protocol called MABS (Multicast Authentication Based on Batch Signature) by including two specified schemes MABS-B and MABS-E. Where MABS-B reduces the packet loss by eliminating the relationship between packets ,and due to its efficient cryptographic primitive called batch signature it provides efficient latency, computation and communication overhead .Where MABS-E improve the Dos impact by combining the basic scheme with a packet filtering mechanism while preserving the perfect resilience to packet loss.