Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol1

被引:0
作者
Choi, Seonho [1 ]
Eom, Hyeonsang [2 ]
Jung, Edward [3 ]
机构
[1] Bowie State Univ, Dept Comp Sci, Bowie, MD 20715 USA
[2] Seoul Natl Univ, Sch Engn & Comp Sci, Seoul, South Korea
[3] Southern Polytech Univ, Sch Comp & SE, Marietta, GA 30067 USA
来源
ICT&A 2011/DEMSET 2011: INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES AND APPLICATIONS / INTERNATIONAL CONFERENCE ON DESIGN AND MODELING IN SCIENCE, EDUCATION, AND TECHNOLOGY | 2011年
关键词
denial of service; network protocol; authentication; multicast; resource requirement; cryptographic hashing; simulation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 51 It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platform independent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.
引用
收藏
页码:196 / 201
页数:6
相关论文
共 50 条
[31]   Simulation-based evaluation of operating room management policies [J].
Schoenfelder, Jan ;
Kohl, Sebastian ;
Glaser, Manuel ;
McRae, Sebastian ;
Brunner, Jens O. ;
Koperna, Thomas .
BMC HEALTH SERVICES RESEARCH, 2021, 21 (01)
[32]   SIMULATION-BASED PREDICTIVE PROCESS MINING WITH EBPMN: METHODS, CHALLENGES AND OPPORTUNITIES [J].
Bocciarelli, Paolo ;
D'Ambrogio, Andrea .
2024 ANNUAL MODELING AND SIMULATION CONFERENCE, ANNSIM 2024, 2024,
[33]   Phileas: A Simulation-based Approach for the Evaluation of Value-based Fog Services [J].
Poltronieri, Filippo ;
Stefanelli, Cesare ;
Suri, Niranjan ;
Tortonesi, Mauro .
2018 IEEE 23RD INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2018, :210-215
[34]   Performance evaluation of keyless authentication based on noisy channel [J].
Korzhik, Valery ;
Yakovlev, Viktor ;
Morales-Luna, Guillermo ;
Chesnokov, Roman .
COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 :115-+
[35]   Evaluation of the team performance observation tool with targeted behavioral markers in simulation-based interprofessional education [J].
Zhang, Chao ;
Miller, Connie ;
Volkman, Kathleen ;
Meza, Jane ;
Jones, Katherine .
JOURNAL OF INTERPROFESSIONAL CARE, 2015, 29 (03) :202-208
[36]   Simulation-Based Evaluation of Traffic Sign Retroreflectivity Maintenance Practices [J].
Hummer, Joseph E. ;
Harris, Elizabeth A. ;
Rasdorf, William .
JOURNAL OF TRANSPORTATION ENGINEERING-ASCE, 2013, 139 (06) :556-564
[37]   Evaluation of a Simulation-based Program for Medic Cognitive Skills Training [J].
Lai, Fuji ;
Entin, Eileen B. ;
Brunye, Tad ;
Sidman, Jason ;
Entin, Elliot E. .
MEDICINE MEETS VIRTUAL REALITY 15: IN VIVO, IN VITRO, IN SILICO: DESIGNING THE NEXT IN MEDICINE, 2007, 125 :259-+
[38]   Simulation-Based Evaluation of Robot and Wireless Sensor Network Interaction [J].
Sebestyen-Pal, Gheorghe ;
Rus, George-Daniel .
2012 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, THETA 18TH EDITION, 2012, :210-215
[39]   Simulation-based evaluation of the accuracy in indirectly estimating gillnet selectivity [J].
Brenden, Travis O. ;
Zhao, Yingming .
FISHERIES RESEARCH, 2012, 134 :64-72
[40]   Simulation-based evaluation of the ramp-up behavior of waferfabs [J].
Sturm, R ;
Dorner, J ;
Reddig, K ;
Seidelmann, J .
ASCMC 2003: IEEE/SEMI (R) ADVANCED SEMICONDUCTOR MANUFACTURING CONFERENCE AND WORKSHOP, PROCEEDINGS, 2003, :111-117