Open Access Open Access  Restricted Access Subscription Access

Multicast Authentication Protocol in the Two-way Relay Channel with Active Attackers

N. Viji, B. Jayanthy

Abstract


An effective key generation scheme that achieves a substantially larger key rate than that of a direct channel mimic approach. Existing schemes, there is need for the key generating terminals to obtain correlated observations in our scheme. It also investigate the effects of an active attacker on the proposed key a novel multicast authentication protocol, namely MABS, including two schemes. The basic scheme (MABS-B) eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously. It also present an enhanced scheme MABS-E, which combines the basic scheme with a packet filtering mechanism to alleviate the DoS impact while preserving the perfect resilience to packet loss.

Keywords: MABS, packet filtering mechanism, video broadcast, probability distribution function (pdf), UWB

Cite this Article
N. Viji, B. Jayanthy. Multicast Authentication Protocol in the Two-Way Relay Channel With Active Attackers. Journal of Operating Systems Development & Trends. 2016; 3(1): 22–30p.


Full Text:

PDF

References


Zhou H, Huie L and Lai L. Key generation in two-way relay wireless channels. Proc. 17th Annu. Conf. Inf. Sci. Syst., Baltimore, MD, USA. 2013: 1–6p.

Wilson R, Tse D, and Scholtz R. Channel identification: Secret sharing using reciprocity in UWB channels. IEEE Trans. Inf. Forensics Security. 2007; 2(3): 364–375p.

Ye C et al. Information-theoretically secret key generation for fading wireless channels. IEEE Trans. Inf. Forensics Security. 2010; 5(2): 240–254p.

Lai L, Liang Y, and Poor H V. A unified framework for key agreement over wireless fading channels. IEEE Trans. Inf. Forensics Security. 2012; 7(2): 480–490p.

Sayeed A, Perrig A. Secure wireless communications: Secret keys through multipath. Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process., Las Vegas, NV, USA. 2008: 30–31p.

Mathur S et al. Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel. in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., San Francisco, CA, USA. 2008:128–139p.

Zeng K, Wu D, Chan A, and Mohapatra P. Exploiting multiple antenna diversity for shared key generation in wireless networks. Proc. IEEE INFOCOM, San Diego, CA, USA. 2010: 1–6p.

Wang Q, Xu K, Ren K. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE J. Sel. Areas Commun. 2009; 30(9): 1666–1674p.

Shimizu T, Iwai H, and Sasaoka H. Physical-layer secret key agreement in two-way wireless relaying. IEEE Trans.

Inf. Forensics Security. 2011; 6(3): 650–660p.

Lai L, Liang Y, and Du W. Cooperative key generation in wireless network. IEEE J. Sel. Areas Commun. 2012; 30(8): 1578–1588p.

Rafaeli S and Hutchison D. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys. 2003; 35(3): 309–329p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/