To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs

Abstract

Authentication is one of the decisive subjects in protecting multicast in a situation attractive to malicious attacks. Multicast is a competent method to transport multimedia content from a sender to a group of receivers and is gaining popular applications such as real time stock quotes, interactive games, video conference, live video broadcast or video on demand. The batch signature methods can be used to perk up the presentation of broadcast authentication. In this paper we recommend all-inclusive revise on this approach and suggest a novel multicast authentication protocol called MABS (Multicast Authentication based on Batch Signature). The essential scheme called MABS-B hereafter operates an wellorganized asymmetric cryptographic primitive called batch signature which supports the authentication of any number of packets concurrently with one signature verification to address the competence and packet loss problems in universal surroundings.

Authors and Affiliations

J. Rama Krishna| Dept. of CSE, St.Mary’s Group of Institutions, Chebrolu, Guntur dist, A.P, India, M. Ambarisha| Dept. of CSE, St.Mary’s Group of Institutions, Chebrolu, Guntur dist, A.P, India

Keywords

Related Articles

FPGA Based Wireless Jamming Networks

A mobile jammeris a device which is used to jam signals of cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this...

Application Of Integrated Interface Schema (Iis) Over Multiple Wdbs To Enhance Data Unit Annotation

An annotation wrapper for the search site is automatically build and can be used to interpret new result pages from the same web database. A growing number of databases have become web accessible through HTML form ba...

Efficient User Revocation Technique for Data Forwarding In Untrusted Cloud

We propose a safe information sharing plan for dynamic individuals. Initially, we propose a secured way for key transport with no sheltered correspondence channels, and the customers can securely get their private ke...

Fast Keyword Search Assumption In The Random Oracle (RO) Model

This proposes searchable public key ciphertexts with hidden structures (SPCHS) for keyword seek as quickly as conceivable without giving up semantic security of the encoded keywords. In SPCHS, all keyword searchable...

Anomaly Detection on Firewall Logs from Multifold System Based on Email Classification

The greater part of the current frameworks sort the report or firewall logs-corpus in light of the term similitude by discover the archive term relationship. It can't distinguish the calculated comparability or conne...

Download PDF file
  • EP ID EP16448
  • DOI -
  • Views 333
  • Downloads 31

How To Cite

J. Rama Krishna, M. Ambarisha (2015). To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs. International Journal of Science Engineering and Advance Technology, 3(1), 1099-1102. https://europub.co.uk/articles/-A-16448