The document proposes a novel high order tree scheme called MKE-MGKM for securing key management in multiple multicast group environments. The MKE-MGKM scheme uses asymmetric master and slave keys generated from a master key encryption algorithm. This asymmetry allows rekeying overhead to be reduced by modifying only the master key when a slave key is updated, while keeping other slave keys unchanged. Numerical analysis and simulations show the MKE-MGKM scheme can reduce the storage overhead of a key distribution center by 75% and the storage overhead of a user by up to 85%, as well as communication overhead by 60%, compared to existing schemes. The scheme aims to address limitations of existing group key management schemes for multiple co-existing multicast
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSIJNSA Journal
Abstract. Information centric networking (ICN) using architectures such as Publish-Subscribe Internet
Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an
important candidate for the Internet of the future. ICN is an emerging research area that proposes a
transformation of the current host centric Internet architecture into an architecture where information
items are of primary importance. This change allows network functions such as routing and locating to be
optimized based on the information items themselves. The Bloom filter based content delivery is a sourcerouting
scheme that is used in the PSIRP/PURSUIT architectures. Although this mechanism solves many
issues of today’s Internet such as the growth of the routing table and the scalability problems, it is
vulnerable to distributed denial-of-service (DDoS) attacks. In this paper, we present a new content delivery
scheme that has the advantages of Bloom filter based approach while at the same time being able to
prevent DDoS attacks on the forwarding mechanism. Our security analysis suggests that with the proposed
approach, the forwarding plane is able to resist attacks such as DDoS with very high probability.
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative GroupsIJMER
A Mobile Ad Hoc Network(MANET) is a system made up of wireless mobile nodes. These
MANET nodes have wireless communication and networking characteristics. MANETs have been
proposed to serve as an effective networking system facilitating information exchange between mobile
devices even without fixed infrastructures. In MANETs, it is important to support group-oriented
applications, such as audio/video conference and one-to-many data dissemination in disaster or
battlefield rescue scenarios. In the above group oriented communication scenarios, the common problem
is to enable a sender to securely transmit secret messages to a remote cooperative group. A solution to
the above problem must meet several constraints. First, the sender must be remote and can be dynamic.
Second, the message transmission may cross various networks including open insecure networks before
reaching the intended recipients. Third, the data communication from the group members to the sender
may be limited. Also, the sender may wish to choose only a subset of the overall group as the intended
recipients. Furthermore, it is hard to resort to a fully trusted third party to secure the overall
communication. In contrast to the above constraints, mitigating features are that the group members are
cooperative and the secret communication among them is local and efficient. This paper exploits these
mitigating features to facilitate the remote access control of group-oriented communications without
relying on a fully trusted secret key generation center.
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Analysis of threats and security issues evaluation in mobile P2P networks IJECEIAES
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
PROACTIVE DETECTION OF DDOS ATTACKS IN PUBLISH-SUBSCRIBE NETWORKSIJNSA Journal
Abstract. Information centric networking (ICN) using architectures such as Publish-Subscribe Internet
Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an
important candidate for the Internet of the future. ICN is an emerging research area that proposes a
transformation of the current host centric Internet architecture into an architecture where information
items are of primary importance. This change allows network functions such as routing and locating to be
optimized based on the information items themselves. The Bloom filter based content delivery is a sourcerouting
scheme that is used in the PSIRP/PURSUIT architectures. Although this mechanism solves many
issues of today’s Internet such as the growth of the routing table and the scalability problems, it is
vulnerable to distributed denial-of-service (DDoS) attacks. In this paper, we present a new content delivery
scheme that has the advantages of Bloom filter based approach while at the same time being able to
prevent DDoS attacks on the forwarding mechanism. Our security analysis suggests that with the proposed
approach, the forwarding plane is able to resist attacks such as DDoS with very high probability.
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative GroupsIJMER
A Mobile Ad Hoc Network(MANET) is a system made up of wireless mobile nodes. These
MANET nodes have wireless communication and networking characteristics. MANETs have been
proposed to serve as an effective networking system facilitating information exchange between mobile
devices even without fixed infrastructures. In MANETs, it is important to support group-oriented
applications, such as audio/video conference and one-to-many data dissemination in disaster or
battlefield rescue scenarios. In the above group oriented communication scenarios, the common problem
is to enable a sender to securely transmit secret messages to a remote cooperative group. A solution to
the above problem must meet several constraints. First, the sender must be remote and can be dynamic.
Second, the message transmission may cross various networks including open insecure networks before
reaching the intended recipients. Third, the data communication from the group members to the sender
may be limited. Also, the sender may wish to choose only a subset of the overall group as the intended
recipients. Furthermore, it is hard to resort to a fully trusted third party to secure the overall
communication. In contrast to the above constraints, mitigating features are that the group members are
cooperative and the secret communication among them is local and efficient. This paper exploits these
mitigating features to facilitate the remote access control of group-oriented communications without
relying on a fully trusted secret key generation center.
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
Peer-to-peer (P2P) networks existing on a MANET are a natural evolution since both are decentralized and have dynamic
topologies. As MANETs grow in use due to the increasing popularity of wireless mesh and 4G networks, it is expected that P2P
applications will remain as a popular means of obtaining files. Network coding has been shown as an efficient means of sharing large
Files in a P2P network. With network coding, all file blocks have the same relative importance. This paper presents an efficient
content distribution scheme that uses network coding to share large files in a P2P overlay running on a MANET. Peers request file
blocks from multiple server nodes and servers multicast blocks to multiple receivers, providing efficient multipoint-to-multipoint
communication.
Simulation results show that compared to other common download techniques, the proposed scheme performs very well, having lower
download time and energy consumption. Also, more peers participate in uploading the file, resulting in greater fairness.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...IJERD Editor
Multicasting is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source. The copies of the messages are automatically created in other network elements like routers but only when the topology of the network requires it. Multicast is implemented most commonly in IP multicast which is further could be employed in internet protocol applications of streaming media. In the IP multicast the implementation of the multicast concept occurs at the IP routing level where routers create optimal distribution paths for datagram sent to a multicast destination address. At the Data Link Layer, multicast describes one-to-many distribution such as Ethernet multicast addressing, Asynchronous Transfer Mode (ATM) point-to-multipoint virtual circuits (P2MP) multicast. In this paper we have compared various multicasting mechanisms. The comparison is done on the basis of various factors like complexity, overhead, maintenance, etc. The mechanisms that are part of the paper are a secure ALM P2P multicasting technique for large scale networks using face recognition, IP multicasting techniques and the overlay multicasting techniques. The comparison of these multicasting techniques will help us to design and Implement a Secure Application-Level Multicasting (SALM) P2P Overlay Multicasting for large Scale Network. The main objective of the paper is to discuss all the three above mentioned multicasting phenomenon’s and compare them on the basis of certain criterion so as carved out the best of all which can be further used for designing a secure multicasting technique which can take the best features of all combined together so as to get effective and efficient technique for multicasting the throughput of the network by effective and efficient delivery of the information to all the members of the group. The certain findings can be carved out of the comparison can help us to create a multicasting technique with less incurring of delays so that information can be delivered in limited time span and multicast path length so that efficient paths should be used so as to enhance performance in multicasting. Moreover in this paper we will study & investigate other issues that degrades the performance of Multicasting Techniques for large Scale Network and later we will come to know through the comparison that which technique performs well in these harsh environment and give effective results.
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONijiert bestjournal
The Effective Key Generation for Multimedia and Web Application is used as the core
component of many web and multimedia applications such as pay-TV, teleconferencing,
real-time distribution of stock market price and etc. The main challenges for secure multicast
are scalability, efficiency and authenticity. In this project, we propose a scalable, efficient,
authenticated group key agreement scheme for large and dynamic multicast systems. The
proposed key agreement scheme is identity-based which uses the bilinear map over the
elliptic curves. Compared with the existing system, the proposed system provides group
member authenticity without imposing extra mechanism. Furthermore, we give a scalability
solution based on the subgroups, which has advantages over the existing schemes. Security
analysis shows that our scheme satisfies both forward secrecy and backward secrecy.
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
Key organization and protect routing are two major subjects for Mobile Ad-hoc Networks nonetheless preceding explanations tend to contemplate them distinctly. This indicates to Key organization and protects routing inters dependency cycle problem. In this paper, we recommend a Key organization and protection of routing integrated scheme that speeches Key organization and protection of routing inter dependency cycle problem. By using identity based cryptography this scheme delivers produced including confidentiality, honesty, verification, cleanness, and non-repudiation. Connected to symmetric cryptography and conventional asymmetric cryptography as well as preceding IBC arrangements, this arrangement has developments in many features. We deliver hypothetical resistant of the refuge of the scheme and validate the efficiency of the scheme with applied simulation.
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, we present a trust based content distribution for peer-to-peer overlay networks, which is built on the trust management scheme. The main concept is, before sending or accepting the traffic, the trust of the peer must be validated. Based on the success of data delivery and searching time, we calculate the trust index of a node. Then the aggregated trust index of the peers whose value is below the threshold value is considered as distrusted and the corresponding traffic is blocked. By simulation results we show that our proposed scheme achieves increased success ratio with reduced delay and drop.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
A study of index poisoning in peer topeerIJCI JOURNAL
P2P file sharing systems are the most popular forms of file sharing to date. Its client-server architecture
attains faster file transfers, however with its peer anonymity and lack of authentication it has become a
gold mine for malicious attacks. One of the leading sources of disruptions in the P2P file sharing systems is
the index poisoning attacks. This attack seeks to corrupt the indexes used to reference files available for
download in P2P systems with false data. In order to protect the users from these attacks it is important to
find solutions to eliminate or mitigate the effects of index poisoning attacks. This paper will analyze index
poisoning attacks, their uses and solutions proposed to defend against them.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
Peer-to-peer (P2P) networks existing on a MANET are a natural evolution since both are decentralized and have dynamic
topologies. As MANETs grow in use due to the increasing popularity of wireless mesh and 4G networks, it is expected that P2P
applications will remain as a popular means of obtaining files. Network coding has been shown as an efficient means of sharing large
Files in a P2P network. With network coding, all file blocks have the same relative importance. This paper presents an efficient
content distribution scheme that uses network coding to share large files in a P2P overlay running on a MANET. Peers request file
blocks from multiple server nodes and servers multicast blocks to multiple receivers, providing efficient multipoint-to-multipoint
communication.
Simulation results show that compared to other common download techniques, the proposed scheme performs very well, having lower
download time and energy consumption. Also, more peers participate in uploading the file, resulting in greater fairness.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Analysis and Secure ALM P2P Overlay Multicasting of Various Multi...IJERD Editor
Multicasting is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source. The copies of the messages are automatically created in other network elements like routers but only when the topology of the network requires it. Multicast is implemented most commonly in IP multicast which is further could be employed in internet protocol applications of streaming media. In the IP multicast the implementation of the multicast concept occurs at the IP routing level where routers create optimal distribution paths for datagram sent to a multicast destination address. At the Data Link Layer, multicast describes one-to-many distribution such as Ethernet multicast addressing, Asynchronous Transfer Mode (ATM) point-to-multipoint virtual circuits (P2MP) multicast. In this paper we have compared various multicasting mechanisms. The comparison is done on the basis of various factors like complexity, overhead, maintenance, etc. The mechanisms that are part of the paper are a secure ALM P2P multicasting technique for large scale networks using face recognition, IP multicasting techniques and the overlay multicasting techniques. The comparison of these multicasting techniques will help us to design and Implement a Secure Application-Level Multicasting (SALM) P2P Overlay Multicasting for large Scale Network. The main objective of the paper is to discuss all the three above mentioned multicasting phenomenon’s and compare them on the basis of certain criterion so as carved out the best of all which can be further used for designing a secure multicasting technique which can take the best features of all combined together so as to get effective and efficient technique for multicasting the throughput of the network by effective and efficient delivery of the information to all the members of the group. The certain findings can be carved out of the comparison can help us to create a multicasting technique with less incurring of delays so that information can be delivered in limited time span and multicast path length so that efficient paths should be used so as to enhance performance in multicasting. Moreover in this paper we will study & investigate other issues that degrades the performance of Multicasting Techniques for large Scale Network and later we will come to know through the comparison that which technique performs well in these harsh environment and give effective results.
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONijiert bestjournal
The Effective Key Generation for Multimedia and Web Application is used as the core
component of many web and multimedia applications such as pay-TV, teleconferencing,
real-time distribution of stock market price and etc. The main challenges for secure multicast
are scalability, efficiency and authenticity. In this project, we propose a scalable, efficient,
authenticated group key agreement scheme for large and dynamic multicast systems. The
proposed key agreement scheme is identity-based which uses the bilinear map over the
elliptic curves. Compared with the existing system, the proposed system provides group
member authenticity without imposing extra mechanism. Furthermore, we give a scalability
solution based on the subgroups, which has advantages over the existing schemes. Security
analysis shows that our scheme satisfies both forward secrecy and backward secrecy.
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
Key organization and protect routing are two major subjects for Mobile Ad-hoc Networks nonetheless preceding explanations tend to contemplate them distinctly. This indicates to Key organization and protects routing inters dependency cycle problem. In this paper, we recommend a Key organization and protection of routing integrated scheme that speeches Key organization and protection of routing inter dependency cycle problem. By using identity based cryptography this scheme delivers produced including confidentiality, honesty, verification, cleanness, and non-repudiation. Connected to symmetric cryptography and conventional asymmetric cryptography as well as preceding IBC arrangements, this arrangement has developments in many features. We deliver hypothetical resistant of the refuge of the scheme and validate the efficiency of the scheme with applied simulation.
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, we present a trust based content distribution for peer-to-peer overlay networks, which is built on the trust management scheme. The main concept is, before sending or accepting the traffic, the trust of the peer must be validated. Based on the success of data delivery and searching time, we calculate the trust index of a node. Then the aggregated trust index of the peers whose value is below the threshold value is considered as distrusted and the corresponding traffic is blocked. By simulation results we show that our proposed scheme achieves increased success ratio with reduced delay and drop.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Many people mistaken that Internet 2.0 is Web 2.0 which is a mis-concept. Internet means internetworking which works at the transmission media layer and current Internet is based on IP protocol therefore is subject to many security vulnerabilities. Internet 2.0 is based on new patented protocol which utilize native telephony network to establish secure point to point connection and able to prevents a lot of current Internet vulnerabilities.
A study of index poisoning in peer topeerIJCI JOURNAL
P2P file sharing systems are the most popular forms of file sharing to date. Its client-server architecture
attains faster file transfers, however with its peer anonymity and lack of authentication it has become a
gold mine for malicious attacks. One of the leading sources of disruptions in the P2P file sharing systems is
the index poisoning attacks. This attack seeks to corrupt the indexes used to reference files available for
download in P2P systems with false data. In order to protect the users from these attacks it is important to
find solutions to eliminate or mitigate the effects of index poisoning attacks. This paper will analyze index
poisoning attacks, their uses and solutions proposed to defend against them.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Making Use of the Linked Data Cloud: The Role of Index StructuresThomas Gottron
The intensive growth of the Linked Open Data Cloud has spawned a web of data where a multitude of data sources provides huge amounts of valuable information across different domains. Nowadays, when accessing and using Linked Data more and more often the challenging question is not so much whether there is relevant data available, but rather where it can be found and how it is structured. Thus, index structures play an important role for making use of the information in LOD cloud. In this talk I will address three aspects of Linked Data index structures: (1) a high level view and categorization of indices structures and how they can be queried and explored, (2) approaches for building index structures and the need to maintain them and (3) some example applications which greatly benefit from indices over linked data.
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is an open access journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
Classroom Shared Whiteboard System using Multicast Protocolijtsrd
Multiple hosts wish to receive the same data from one or more senders. Multicast routing defines extensions to IP routers to support broadcasting data in IP networks. Multicast data is sent and received at a multicast address which defines a group. Data is sent and received in multicast groups via routing trees from sender s to receivers. Demonstrative lectures require to share the computer screen of the lecturer to the students as well as to make discussion with the students. The Multicast protocol is the most suitable method because of its capability in speed and better synchronized process. The word multicast is typically used to refer to IP multicast which is often employed for streaming media, and Internet television applications. Wit Yee Swe | Khaing Thazin Min | Khin Chan Myae Zin | Yi Yi Aung "Classroom Shared Whiteboard System using Multicast Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27976.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/27976/classroom-shared-whiteboard-system-using-multicast-protocol/wit-yee-swe
LIVE media streaming applications have become more and more popular. IP multicast is the most efficient mechanism but Due to the practical issues of routers, IP multicast has not been widely deployed in the wide-area network infrastructure. The application-level solution build a peer-to-peer (P2P) overlay network out of unicast tunnels across cooperative participating users. P2P media streaming has become a promising approach to broadcast non interactive live media from one source to a large number of receivers. Design of a live P2P streaming system faces many challenges. Therefore, no single application-level multicast stream can meet the requirements of everyone. The proposed architecture aims to provide higher streaming quality and to provide robustness. In the Proposed System the Parallel efforts have been exerted in the media streaming field and networking field to avoid the problem of distributing LIVE video. The tree-based approaches are vulnerable for dynamic group variation but the gossip based mesh-like topology for overlay network systems allow peers to form multiple neighbors, so multilayered video contents are distributed among mesh-like network. Due to this multisource transmission scheme, packets can be exchanged among clients efficiently. In Proposed, The system can achieve improved performance on video delivery quality, bandwidth utilization, and service reliability when using the peer-assisted multipath transmission.
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...CSCJournals
End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the limitation in bandwidth and the fact that the message needs to be forwarded from host-to-host using unicast connection, and consequently incrementing the end-to-end delay of the transmission process, contribute to the price to pay for this new approach. Therefore, supporting high-speed real-time applications such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games require a sound understanding of these multicasting schemes such as IP multicast and ESM and the factors that might affect the end-user requirements. In this paper, we present both the analytical and the mathematical models for formalizing the end-to-end delay and the bandwidth efficiency of both IP and ESM multicast system. For the sake of the experimental verifications of the proposed models, numerical and simulation results are presented in this paper. Finally, the proposed formulization can be used to design and implement a more robust and efficient multicast systems for the future networks
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
Peer-to-peer systems have gained a lot of attention as information sharing systems for the widespread exchange of resources and voluminous information that is easily accessible among thousands of
users. However, current peer-to-peer information sharing systems work mostly on wired networks. With
the growing number of communication-equipped mobile devices that can self-organize into
infrastructure-less communication platform, namely mobile ad hoc networks (MANETs), peer-to-peer
information sharing over MANETs becomes a promising research area. In this paper, we propose a
Region-Based structure that enables efficient and secure peer-to-peer information sharing over MANETs.
The implementation shows that the proposed scheme is Secure, scalable, efficient, and adaptive to node
mobility and provides Reliable information sharing.
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
Peer-to-peer systems have gained a lot of attention as information sharing systems for the widespread exchange of resources and voluminous information that is easily accessible among thousands of
users. However, current peer-to-peer information sharing systems work mostly on wired networks. With
the growing number of communication-equipped mobile devices that can self-organize into
infrastructure-less communication platform, namely mobile ad hoc networks (MANETs), peer-to-peer
information sharing over MANETs becomes a promising research area. In this paper, we propose a
Region-Based structure that enables efficient and secure peer-to-peer information sharing over MANETs.
The implementation shows that the proposed scheme is Secure, scalable, efficient, and adaptive to node
mobility and provides Reliable information sharing.
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
Peer-to-peer systems have gained a lot of attention as information sharing systems for the widespread exchange of resources and voluminous information that is easily accessible among thousands of
users. However, current peer-to-peer information sharing systems work mostly on wired networks. With
the growing number of communication-equipped mobile devices that can self-organize into
infrastructure-less communication platform, namely mobile ad hoc networks (MANETs), peer-to-peer
information sharing over MANETs becomes a promising research area. In this paper, we propose a
Region-Based structure that enables efficient and secure peer-to-peer information sharing over MANETs.
The implementation shows that the proposed scheme is Secure, scalable, efficient, and adaptive to node
mobility and provides Reliable information sharing
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensingchennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
Impact of Mobility for Qos Based Secure Manet graphhoc
Secure multicast communication in Mobile Adhoc Networks (MANETs) is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, limited resources such as bandwidth, energy and power. Several group oriented applications over MANETs create new challenges to routing protocols in terms of QOS requirements. In many multicast interactions, due to its frequent node mobility, new member can join and current members can leave at a time. It is necessary to choose a routing protocol which establishes true connectivity between the mobile nodes. The pattern of movement of members is classified into different mobility models and each one has its own distinct features. It is a crucial part in the performance of MANET. Hence key management is the fundamental challenge in achieving secure communication using multicast key distribution for mobile adhoc networks. This paper describes the impact of mobility models for the performance of a new cluster-based multicast tree algorithm with destination sequenced distance vector routing protocol in terms of QOS requirements such as end to end delay, energy consumption and key delivery ratio. For simulation purposes, three mobility models are considered. Simulation results illustrate the performance of routing protocol with different mobility models and different mobility speed under varying network conditions.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
A Novel High Order Tree for Securing Key Management for Multicast Services
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 1 (May. - Jun. 2013), PP 36-40
www.iosrjournals.org
www.iosrjournals.org 36 | Page
A Novel High Order Tree for Securing Key Management for
Multicast Services
M.Latha1
, Mrs.S.Nalini2
,
1.M.E (CSE), Department of Computer science & Engg,University College of Engineering,BIT Campus, Trichy,
2.Asst. Professor, Department of Computer Applications, University College of Engineering,BIT Campus Trichy
Abstract: With the emergence of diverse group-based services, multiple multicast groups are likely to co-exist
in a single network,and users may subscribe to multiple groups simultaneously. However, the existing group key
management (GKM) schemes, aiming to secure communication within a single group, are not suitable in
multiple multicast group environments because of inefficient use of keys, and much larger rekeying overheads.
In this paper, we propose a new group key management scheme for multiple multicast groups, called the
master-key-encryption-based multiple group key management (MKE-MGKM) scheme. The MKE-MGKM
scheme exploits asymmetric keys, i.e., a master key and multiple slave keys, which are generated from the
proposed master key encryption(MKE) algorithm, and is used for efficient distribution of the group key. It
alleviates the rekeying overhead by using the asymmetry of the master and slave keys, i.e., even if one of the
slave keys is updated, the remaining ones can still be unchanged by modifying only the master key. Through
numerical analysis and simulations, it is shown that the MKE-MGKM scheme can reduce the storage overhead
of a key distribution center (KDC) by 75% and the storage overhead of a user by up to 85%, and 60% of the
communication overhead at most, compared to the existing schemes.
Index Terms: Security, group Key Management, multicast, chinese remainder theorem, master key encryption
I. INTRODUCTION
Objective of the project
The multicast group can be identified with the class D IP address so that the members can enter or
leave the group with the management of Internet group management protocol. The trusted model gives a scope
between the entities in a multicast security system. For secure group communication in the multicast network, a
group key shared by all group members is required. This group key should be updated when there are
membership changes in the group, such as when a new member joins or a current member leaves. Along with
these considerations, we take the help relatively prime numbers and their enhancements that play a vital role in
the construction of keys that enhances the strength for the security. Multicast cryptosystems are preferably for
sending the messages to a specific group of members in the multicast group.
Unicast is for one recipient to transfer the message and „Broadcast‟ is to send the message to all the
members in the network. Multicast applications have a vital role in enlarging and inflating of the Internet. The
Internet has experienced explosive growth in last two decades. The number of the Internet users, hosts and
networks triples approximately every two years. Also Internet traffic is doubling every three months partly
because of the increased users, but also because of the introduction of new multicast applications in the real
world such as video conferencing, games, atm applications etc.. Broad casting such as www, multimedia
conference and e-commerce, VOD (Video on Demand), Internet broadcasting and video conferencing require a
flexible multicasting capability. Multicast is a relatively new form of communications where a single packet is
transmitted to more than one receivers. The Internet does not manage the multicast group membership tightly. A
multicast message is sent from a source to a group of destination hosts. A source sends a packet to a multicast
group specifying as the multicast group address. The packet is automatically duplicated at intermediate routers
and any hosts that joined the group can receive a copy of the packet. Because a host can receive transmitted data
of any multicast groups, secure communications is more important in multicasting than in unicasting.
II. Multicast
In computer networking, multicast is the delivery of a message or information to a group of destination
computers simultaneously in a single transmission from the source. Copies are automatically created in other
network elements, such as routers, but only when the topology of the network requires it.
Multicast is most commonly implemented in IP multicast, which is often employed in Internet Protocol
(IP) applications of streaming media and Internet television. In IP multicast the implementation of the multicast
concept occurs at the IP routing level, where routers create optimal distribution paths for data grams sent to a
multicast destination address.
2. A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 37 | Page
2.2.GroupKey Management in Multicast Security
Multicast technology is used for distributing data to a group of participants by conserving bandwidth more
efficiently than traditional unicast mechanism. This is done by replicating IP streams in the router at the same
time thus achieving better delivery to multiple users. This would mean conservation of computational resources
of the sender and bandwidth efficiency in the network. A group membership can be performed using the
Internet Group Multicast Protocol (IGMP) protocol. It provides admission control operation such as "join" and
"leave". Some examples of applications that take advantage of multicast technology are video conferencing,
digital broadcasting, software distribution and electronic learning
2.3. A Group Key Management Approach For Multicast Cryptosystems
Multicast cryptosystems are preferably for sending the messages to a specific group of members in the
multicast group. Unicast is for one recipient to transfer the message and „Broadcast‟ is to send the message to all
the members in the network. Multicast applications have a vital role in enlarging and inflating of the Internet.
The Internet has experienced explosive growth in last two decades. The number of the Internet users, hosts and
networks triples approximately every two years. Also Internet traffic is doubling every three months partly
because of the increased users, but also because of the introduction of new multicast applications in the real
world such as video conferencing, games, ATM applications etc. broad casting such as www, multimedia
conference and e-commerce, VOD (Video on Demand), Internet broadcasting and video conferencing require a
flexible multicasting capability.
Multicast is a relatively new form of communications where a single packet is transmitted to more than
one receivers. The Internet does not manage the multicast group membership tightly. A multicast message is
sent from a source to a group of destination hosts. A source sends a packet to a multicast group specifying as the
multicast group address. The packet is automatically duplicated at intermediate routers and any hosts that joined
the group can receive a copy of the packet. Because a host can receive transmitted data of any multicast groups,
secure communications is more important in multicasting than in unicasting.
The security in the multicast communication in the large groups is the major obstacles for effectively
controlling access to the transmitting data. The IP Multicast itself does not provide any specific mechanisms to
control the intruders in the group communication. Group key management is mainly addresses upon the trust
model developed by Group Key Management Protocol (GKMP). There are several group key management
protocols that are proposed, this paper will however elaborate mainly on Group key management which has a
sound scalability when compared with other central key management systems. This paper emphases protocol
which provides a scope for the dynamic group operations like join the group, leave the group, merge without the
need of central mechanisms. An important component for protecting group secrecy is re-keying. With the
combination of strong public and private key algorithms this would become a better serve to the multicast
security.
Multicast routing protocols provide resilience against collaborating malicious nodes. PGKMP is a
complete multipath protocol, in the sense that it provides the maximum security in the network when compared
to the existing protocols like LKH etc. The security of PGKMP is mainly based on neighborhood authentication
of the nodes, as well as on security associations, while the use of public key cryptography is minimized. The
PGKMP protocol can be integrated on top of existing on-demand routing protocols such as LKH. A key reason
for this good performance is the fact that PGKMP operates entirely on-demand with no periodic activity of any
kind required within the network. PGKMP finds disjoint paths only, so the route discovery cost will be less as
compared to LKH where all possible paths exist and a key server has to be maintained. Also due to the double
encryption scheme provided to the protocol, the network is more secured. There is a scope to further decrease
the overheads and increase more security with this Protocol (PGKMP) and a positive hope for the enhancement
of this protocol.
III. Existing System
The existing GKM schemes still face the limitation of rekeying performance as the number of multicast
services increases. However, in the foreseeable future, multiple multicast groups will co-exist in a single
network due to the emergence of many group-based applications. In such a situation, it is likely that the service
provider may suffer from considerable key management overhead for supporting multiple multicast groups. In
existing system if the user wants to access from different server the user have to login each time for different
server hence the key management process become too tedious to handle if the server number increases
tremendously Once the master key has been change the entire configuration has to be configured to access the
service.
3. A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 38 | Page
Disadvantages
Rekeying management is too difficult to handle.
If any changes in the network configuration mean
the entire key system has to be modified.
Group key management has limitation in managing the key.
IV. Proposed System
A new multiple group key management (MGKM) scheme, named the master-key-encryption based
MGKM (MKE-MGKM) scheme,which can reduce the rekeying overhead from managing multiple group keys.
The key idea of the MKE-MGKM is to employ an asymmetric encryption scheme, called the master key
encryption (MKE), to enhance the rekeying performance by alleviating the rekeying overhead. Compared with
the MGKM schemes expanding the existing GKM schemes, the MKE-MGKM scheme can reduce the storage
overhead of a key distribution center (KDC) by 75%. Hence this has been implemented for multicast service
like video streaming and downloading to avoid the pirated movies and to avoid unauthorized users to view and
download the videos in video service websites.
Advantages
Efficient key management process.
No limitation in rekeying process.
Storage resource has been reduced.
Used in third-party data storage system.
V. Problem Definition
The existing GKM schemes targeted to a single multicast group are not directly applicable to the
multiple multicast service environments. If each multicast group is managed by its own GKM scheme according
to the existing GKM schemes, more independent multicast groups would be required. In this case, when a user
subscribing to the multiple multicast services stops subscribing to all the services, all these multicast groups
independently initiate the rekeying procedure, which may result in much more rekeying overhead. To alleviate
the problem of unauthorized video watching and recording from sites.
VI. Experimental Results
MODULE DESCRIPTION
1. Multicast Service Module
2. Traffic Encryption key Generation
3. MKE based MGKM algorithm
4. Rekey Management.
5. Video layer coding
6.1. Multicast Service module
In order to implement the multicast, i.e., the delivery of data only to the members of a group, in
wireless networks, we need to an access control mechanism for the broadcasted messages, which guarantees
confidentiality, protects digital contents, and facilitates accurate accounting.
FIG.6.1
6.2. Traffic Encryption key Generation
All these keys comprise a logical key tree, where the TEK is the root node, an IK is a leaf node, and
the KEKs are the rest of the nodes in the key tree. It can significantly reduce the amount of rekeying overhead
which is a logarithmic function of a group size.
4. A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 39 | Page
FIG.6.2
6.3. MKE based MGKM algorithm
The key idea of the MKE-MGKM is to employ an asymmetric encryption scheme, called the master
key encryption (MKE), to enhance the rekeying performance.
Key distribution
FIG.6.3
6.4. Rekey Management
A rekeying mechanism for multiple groups by introducing a MKE-based key graph having the master
and slave keys. Rekeying can significantly increase due to the number of multiple groups.
6.5.Video layer coding
To deliver high quality video services, it becomes vital to consider the heterogeneous wireless
infrastructure and multi-radio capability of mobile devices.
FIG.6.4
VII. Conclusion And Future Work
The key graph of the MKE-MGKM scheme is much simpler than that of other schemes; less memory is
needed for storing the keys. Compared with other schemes, the MKE-MGKM scheme can significantly reduce
the storage and communication overheads in the rekeying process, with acceptable computational overhead. It is
expected that the MKEMGKM scheme can be a practical solution for various group applications, especially for
those requiring many service groups, such as TV streaming services charged on a channel by channel basis.
In future the concept can be applied for video broadcasting service to avoid unauthorized users to view
and access the video.
TEK
IK 1 IK 2 IK n
Data Encrypt
Master Key
Number of slave key generation Group control and key
server
Compromised key list
Video file Time Slot Allocation
Providing Authorization to
Authenticated users
Rearrangement of Timeslot
dynamically
Video Encoding
Authorized
user/Decoding
Blocked unauthorized user by Genetic
algorithm implementation
5. A Novel High Order Tree for Securing Key Management for Multicast Services
www.iosrjournals.org 40 | Page
References
[1] Lawrence Horte “Introduction to data multicasting”, 2008
[2] Zhang, J, Varadharajan, V and Mu, Y,” A novel dynamic key management scheme for secure multicasting,” ICON2003. The 11th
IEEE International Conference on Network
[3] C. K. Wong, M. G. Gouda, and S. S. Lam, “Secure group communications using key graphs,” 1998.
[4] H. Lu, “A novel high-order tree for secure multicast key management”, IEEE Transactions on Computers, vol. 54, 2005.
[5] Y. Challal and H. Seba, “Group key management protocols: A novel taxonomy,” International Journal of Information
Technology,vol. 2, no. 1, pp. 105–118, 2005.
[6] Sherman and McGrew, “Key establishment in large dynamic groups using one-way function trees,” IEEETSE: IEEE Transactions on
Software Engineering, vol. 29, 2003.
[7] J.-C.Lin, F. Lai, and H.-C. Lee, “Efficient group key management protocol with one-way key derivation,” in LCN. IEEE Computer
Society, 2005, pp. 336–343. [Online].Available:http://doi.ieeecomputersociety.org/10.1109/LCN.2005.61
[8] Y. Sun and K. J. R. Liu, “Hierarchical group access control for secure multicast communications,” IEEE/ACM Trans. Netw, vol. 15,
no. 6, pp. 1514–1526, 2007.
[9] Q. Zhang and Y. Wang, “A centralized key management scheme for hierarchical access control,” in IEEE Globecom. IEEE
Communication Society, 2004, pp. 2067–2071.
[10] D. WALLNER, E. HARDER, , and R. AGEE, “Key management for multicast: Issues and architectures,” IETF, Request For
Comments 2627, 1999.
[11] R. L.Rivest, A.Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications
of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
[12] K. Koyama, “A master key for the RSA public-key cryptosystem,”Systems-Comput.-Controls, vol. 13, no. 1, pp. 63–70 (1983), 1982.
[13] A. Kondracki, “The chinese remainder theorem,” Formalized Mathematics,vol. 6, no. 4, pp. 573–577, 1997.
[14] L. R. YU and L. B. LUO, “The Generalization of the Chinese Remainder Theorem,” Springer Acta Mathematica Sinica, vol. 18,no.
3, pp. 531–538, 2002.
[15] X. Zou, B. Ramamurthy, and S. S. Magliveras, “Chinese remainder theorem based hierarchical access control for secure group
communication,” Lecture Notes in Computer Science, vol. 2229, pp 381–385, 2001.
[16] X. Zheng, C.-T. Huang, and M. M. Matthews, “Chinese remainder theorem based group key management,” in ACM Southeast
Regional Conference, D. John and S. N. Kerr, Eds. ACM, 2007, pp 266–271.