Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol1

被引:0
|
作者
Choi, Seonho [1 ]
Eom, Hyeonsang [2 ]
Jung, Edward [3 ]
机构
[1] Bowie State Univ, Dept Comp Sci, Bowie, MD 20715 USA
[2] Seoul Natl Univ, Sch Engn & Comp Sci, Seoul, South Korea
[3] Southern Polytech Univ, Sch Comp & SE, Marietta, GA 30067 USA
来源
ICT&A 2011/DEMSET 2011: INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES AND APPLICATIONS / INTERNATIONAL CONFERENCE ON DESIGN AND MODELING IN SCIENCE, EDUCATION, AND TECHNOLOGY | 2011年
关键词
denial of service; network protocol; authentication; multicast; resource requirement; cryptographic hashing; simulation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 51 It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platform independent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.
引用
收藏
页码:196 / 201
页数:6
相关论文
共 50 条
  • [1] Resource requirement analysis for a predictive-hashing based multicast authentication protocol
    Choi, Seonho
    Kim, Yanggon
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 302 - 311
  • [2] Automated parameter selection algorithm for predictive-hashing based multicast authentication protocol
    Choi, Seonho
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2006, : 59 - 64
  • [3] Evaluation of a simulation-based curriculum clinical protocol
    Marzano, David
    Smith, Roger
    Mhyre, Jill M.
    Seagull, F. Jacob
    Curran, Diana
    Behrmann, Sydney
    Priessnitz, Kristina
    Hammoud, Maya
    INTERNATIONAL JOURNAL OF GYNECOLOGY & OBSTETRICS, 2016, 135 (03) : 333 - 337
  • [4] Performance evaluation of production systems: A simulation-based approach
    Artiba, A
    Iassinovski, S
    Pichel, D
    SIMULATION AND MODELLING: ENABLERS FOR A BETTER QUALITY OF LIFE, 2000, : 302 - 306
  • [5] A multimedia traffic modeling framework for simulation-based performance evaluation studies
    Golaup, Assen
    Aghvami, Hamid
    COMPUTER NETWORKS, 2006, 50 (12) : 2071 - 2087
  • [6] Evaluation of User Performance in Simulation-Based Diagnostic Cerebral Angiography Training
    Zaika, Oleksiy
    Ngan Nguyen
    Boulton, Mel
    Eagleson, Roy
    de Ribaupierre, Sandrine
    MEDICINE MEETS VIRTUAL REALITY 22, 2016, 220 : 465 - 468
  • [7] A video traffic modeling tool for simulation-based performance evaluation studies
    Sousa-Vieira, M. E.
    2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2010,
  • [8] The simulation-based performance measurement in an evaluation module for Faborg-Sim simulation software
    Koruca, Halil Ibrahim
    Ozdemir, Gultekin
    Aydemir, Erdal
    Cayirli, Muhammed
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 8211 - 8220
  • [9] Simulation-Based Auction Protocol for Resource Scheduling Problems
    Taghaddos, H.
    AbouRizk, S.
    Mohamed, Y.
    Hermann, U.
    JOURNAL OF CONSTRUCTION ENGINEERING AND MANAGEMENT, 2012, 138 (01) : 31 - 42
  • [10] Development of Performance Metrics for Automated Evaluation of Surgeons' Performance Under Simulation-Based Training
    Chang, Albert
    Ennis, Monica
    Fabian, Nicole
    Holbrook, Abigail
    Kayton, Elisabeth
    McCarthy, Marisa
    Kim, Inki
    2017 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), 2017, : 128 - 131