Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709

Reducing Delay And Enhancing Dos Resistance In Multicast Authentication Through Multigrade Security (case Study Of Pressure World Cafee )

Type Project Topics (docx)
Faculty Engineering, Environment & Technology
Course Computer Science
Price ₦3,000
Buy Now
Key Features:
- No of Pages: 41

- No of Chapters: 05
WAEC May/June 2024 - Practice for Objective & Theory - From 1988 till date, download app now - 99995
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
Introduction:

Abstract

Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of partial trust. This paper introduces staggered timed efficient stream loss-tolerant authentication (TESLA), a method for achieving multi-grade authentication in multicast scenarios that reduces the delay needed to filter forged multicast packets and, consequently, mitigates the effects of DoS attacks. Staggered TESLA involves modifications to the popular multicast authentication scheme, TESLA, by incorporating the notion of multilevel trust through the use of multiple, staggered authentication keys in creating message authentication codes (MACs) for a multicast packet. We provide guidelines for determining the appropriate buffer size, and show that the use of multiple MACs and, hence, multiple grades of authentication, allows the receiver to flush forged packets quicker than in conventional TESLA. As a result, staggered TESLA provides an advantage against DoS attacks compared to conventional TESLA. We then examine two new strategies for reducing the time needed for complete authentication. In the first strategy, the multicast source uses assurance of the trustworthiness of entities in a neighborhood of the source, in conjunction with the multi-grade authentication provided by staggered TESLA. The second strategy achieves reduced delay by introducing additional key distributors in the network.

Table of Content

TITLE PAGE

CERTIFICATION

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

TABLE OF CONTENTS



CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

1.2 STATE OF THE PROBLEM

1.3 PURPOSE OF THE STUDY

1.4 AIMS AND OBJECTIVES

1.5 SCOPE OF STUDY

1.6 LIMITATIONS OF STUDY

1.7 ASSUMPTIONS

1.8 DEFINITION OF TERMS



CHAPTER TWO

LITERATURE REVIEW



CHAPTER THREE

3.1 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM

3.2 FACT FINDING METHOD USED

3.3 ORGANIZATION STRUCTURE

3.4 OBJECTIVES OF EXISTING SYSTEM

3.5 INPUT, PROCESS AND OUTPUT ANALYSIS

3.6 INFORMATION FLOW DIAGRAMS

3.7 PROBLEMS OF THE EXISTING SYSTEM

3.8 JUSTIFICATION OF THE NEW SYSTEM



CHAPTER FOUR

4.1 DESIGN OF THE NEW SYSTEM

4.2 INPUT SPECIFICATION AND DESIGN

4.3 OUTPUT SPECIFICATION AND DESIGN

4.4 FILE DESIGN

4.5 PROCEDURE CHART

4.6 SYSTEM FLOW CHART

4.6.1 SYSTEM REQUIREMENTS

4.7 IMPLEMENTATION

4.7.1 PROGRAM DESIGN

4.7.2 PROGRAM FLOWCHART

4.7.3 PSEUDO CODE

4.7.4 SOURCE PROGRAM: TEST RUN



CHAPTER FIVE

5.0 DOCUMENTATION

5.1 RECOMMENDATION

5.2 CONCLUSION

BIBLIOGRAPHY

Introduction

The introduction of this research is only available in the paid version.
Buy Now
 
WAEC Past Questions, Objective & Theory, Study 100% offline, Download app now - 24709
Post-UTME Past Questions - Original materials are available here - Download PDF for your school of choice + 1 year SMS alerts
WAEC May/June 2024 - Practice for Objective & Theory - From 1988 till date, download app now - 99995
WAEC offline past questions - with all answers and explanations in one app - Download for free