MABS Review

12

Click here to load reader

Transcript of MABS Review

Page 1: MABS Review

SUBMITTED BY:1. ANUBHAV (2BL08CS016)

2. BINAY KUMAR (2BL08CS016)3. MANISH KUMAR (2BL08CS031)

4. SONU KUMAR (2BL07CS074)

MABS: MULTICAST AUTHENTICATION BASED on BATCH SIGNATURE

UNDER GUIDANCE OF:PROF. B.C MELINAMATH

Page 2: MABS Review

AbstractConventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size. The correlation among packets makes them vulnerable to packet loss. Moreover, the lack of Denial of Service (DoS) resilience renders most of them vulnerable to packet injection in hostile environments. In this project, we propose a novel multicast authentication protocol, namely MABS, including two schemes.

I. MABS - B

II. MABS - E

Page 3: MABS Review

Introduction• MULTICAST is an efficient method to deliver multimedia content from a

sender to a group of receivers . Authentication is one of the critical topics in securing multicast in an environment attractive to malicious attacks. Basically, multicast authentication may provide the following security services:

Data Integrity: Each receiver should be able to assure that received packets have not been modified during transmissions.

Data Origin Authentication: Each receiver should be able to assure that each received packet comes from the real sender as it claims.

Nonrepudiation: The sender of a packet should not be able to deny sending the packet to receivers in case there is a dispute between the sender and receivers.

Page 4: MABS Review

Problem Defination

Efficiency and packet loss resilience can hardly be supported simultaneously

by conventional multicast schemes.

The heterogeneity of receivers.

Another problem with schemes is that they are vulnerable to packet injection

by malicious attackers.

Page 5: MABS Review

Proposed SystemWe present our comprehensive study on this approach and propose a novel

multicast authentication protocol called MABS (in short for Multicast Authentication based on Batch Signature).

MABS includes two schemes.

The basic scheme (called MABS-B hereafter) utilizes an efficient asymmetric cryptographic primitive called batch signature which supports the authentication of any number of packets simultaneously with one signature verification, to address the efficiency and packet loss problems in general environments.

The enhanced scheme (called MABS-E hereafter) combines MABS-B with packet filtering to alleviate the DoS impact in hostile environments. MABS provides data integrity, origin authentication, and nonrepudiation as previous asymmetric key based protocols.

Page 6: MABS Review

Flow chart

Sender

Select Data

Generate private and public key

Generate the signature using private key

Attach signature

to message

Multicast the data

Generate the signature using public key

VerifyData decrypt

yes

Destination Discard

No

Page 7: MABS Review

Generation of Block Messages In this module we convert the data into small packets. The next step is taking

the packet into generate a block of messages. The block generation depends on the receiver.

We conceive a receiver-oriented approach by taking into account the heterogeneity of the receivers.

As receiving devices have different computation and communication capabilities, some could be powerful desktop computers, while the others could be cheap handsets with limited buffers and low-end CPUs.

Mixed with various channel loss rates, this heterogeneity poses a demand on the capability of adjusting the buffer size and authenticating buffered packets any time when the high layer application requires at each receiver.

Page 8: MABS Review

Batch Signature Generation The BLS signature scheme uses a cryptographic primitive called pairing, which

can be defined as a map over two cyclic groups G1 and G2.

The BLS signature scheme consists of three phases:

In the key generation phase, a sender chooses a random integer and computes . The private key is x and the public key is y.

Given a message m in the signing phase, the sender first computes h = h( m ) G1, where h() is a hash function, then computes = the signature of m .

Page 9: MABS Review

Transmission After generating the signature it will be attached to the block of messages.

Then the block of messages will be transmitted to the destination.

The destination can be received the messages from the buffer. While receiving the message it can verify the signature.

If the result is true it will be accepted otherwise the message will discarded.

Page 10: MABS Review

Verification In the Batch Verify () algorithm should satisfy the following properties:

Given a batch of packets that have been signed by the sender, BatchVerify () outputs True.

Given a batch of packets including some unauthentic packets, the probability that BatchVerify () outputs True is very low.

The computation complexity of BatchVerify () is comparable to that of verifying one signature and is increased only gradually when the batch size n is increased.

Page 11: MABS Review

ADVANTAGES

MABS can achieve perfect resilience to packet loss in lossy channels in the sense

that no matter how many packets are lost the already-received packets can still be

authenticated by receivers.

MABS-B is efficient in terms of less latency, computation, and communication

overhead.

Page 12: MABS Review

Thank You