Open Access Open Access  Restricted Access Subscription or Fee Access

Preventing Denial of Service Attack in Multicast Authentication

S. Geerthik, T.P. Anish


Multicasting is a technique in which the data is send from sender to multiple receivers .In this paper we discuss the different techniques used for multicast authentication. Here the method for authentication, the batch signature verification is discussed and shown that how it is better from block based approach and other conventional approaches. The main drawback of batch signature verification, the denial of service attack is taken into consideration and we propose a composite denial of service attack model in multicast batch signature verification schemes that combines bandwidth exhaustion, memory depletion models and filtering for representation of cyber attacks. On the basic of the introduced model, different experiments are done .The results shows the dependencies of influence of attacker and victim„s properties on the successful probability of DoS attack and the composite model can minimize the DoS attack level in multicast authentication . In future we can improve the efficiency of this method by combining more filtering mechanisms against DoS attacks.


Bandwidth Exhaustion, DoS Attack, Multicast, MABS, SYN FLOOD, TESLA

Full Text:



Perrig, R. Canetti, J. D. Tygar, and D. Song,“Efficient authentication and signature of multicast streams over lossy channels”. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Sept 2000, pp 56–73.

Chang, Rocky K. C , “Defending against flooding-based distributed denial-of-service attacks”: a tutorial, IEEE Communications Magazine 40(10),Oct 2002, pp 42–51.

C. Karlof, N. Sastry, Y. Li, A. Perrig, and J.D. Tygar, “Distillation Codes and Applications to DoS Resistant Multicast Authentication,” In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS‟04), San Diego, California, Feb 2004, pp 37-56.

Huang,Q.; Kobayashi, H.; Liu, B. “Analysis of a new form of distributed denial of service attack”, in the Conference of Information Science and Systems. The Johns Hopkins University, March 2003, pp 1-6.

J.Camenisch and A. Lysyanskaya.“Dynamic accumulators and application to efficient revocation of anonymous credentials”. In Advances in Cryptology – CRYPTO ‟02, volume 2442 of Lecture Notes in Computer Science, Feb 2002, pp 61-76.

J. M. Park, E. Chong, and H. J. Siegel. “Efficient multicast packet authentication using erasure codes” ACM Transactions on Information and System Security(TISSEC), May 2003, pp 258-285.

M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, and V. Stemann. “Practical loss-resilient codes”. In Proceedings of 29th Annual ACM Symposium on Theory of Computing (STOC ‟97), May 1997, pp 150-159.

Shouhuai Xu, Ravi Sandhu,”Authenticated Multicast Immune to Denial-of-Service”, Proceedings of ACM symposium on Applied computing, March 2002, pp 196-200.

Stephen. M. Specht, Ruby. B. Lee.”Distributed denial of service: Taxonomies of attacks, tools and countermeasures, in International Conference Parallel and Distributed Computing Dydtems. San Francisco, Sep 2004, pp 15–17.

T. Hardjono and G. Tsudik. "IP multicast security: Issues and directions", presented at Annales des Telecommunications, April 2000, pp 324-340.

Yun, Zhou. “MABS: Multicast Authentication based on Batch Signature”, IEEE Transactions on Mobile Computing, Vol. 9, No. 7, July 2010, pp 982-993.

Yun, Zhou, “Multimedia Broadcast Authentication Based on Batch Signature” IEEE Communications Magazine,, Vol. 45, No. 8, August 2007, pp 72-77.

Nakashima, Takuo. “Performance Estimation of TCP under SYN flood attacks”International conference on Complex Intelligent and Software Intensive Systems, April 2007, pp 92-99.

Zhu, Ning, Zhang, Yongfu, ”A new method to construct DoS attack oriented to Attack Resistance Test”, Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on Dec 2010, pp 654-659.

Specht, S.M, Lee, R. B, “Distributed denial of service: taxonomies of attacks, tools and countermeasures”, in International Conference of Parallel and Distributed Computing Dydtems, San Francisco, 2004, 15–17.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.