Friday 29th of March 2024
 

Efficient Design for the Implementation of Wong-Lam Multicast Authentication Protocol Using Two-Levels of Parallelism


Ghada F. Elkabbany and Heba K. Aslan

Group communication can benefit from Internet Protocol (IP) multicast protocol to achieve efficient exchange of messages. However, IP multicast does not provide any mechanisms for authentication. In literature, many solutions to solve this problem were presented. It has been shown that Wong and Lam protocol is the only protocol that can resist both packet loss and pollution attacks. In contrast, it has high computation and communication overheads. In the present paper, an efficient design for the implementation of Wong and Lam multicast authentication protocol is proposed. In order to solve the computation overhead problem, we use two-levels of parallelism. To reduce the communication overhead, we use Universal Message Authentication Codes (UMAC) instead of hash functions. The design is analyzed for both NTRU and elliptic curve cryptography signature algorithms. The analysis shows that the proposed design decreases significantly the execution time of Wong-Lam protocol which makes it suitable for real-time applications.

Keywords: Group Communication, Multicast Authentication, Parallel Processing, Clustering, Message Passing Systems

Download Full-Text


ABOUT THE AUTHORS

Ghada F. Elkabbany
She received her B.Sc. degree, M.Sc. degree and Ph.D. degree in Electronics and Communications Engineering from the Faculty of Engineering, Cairo University, Egypt. Her research interests include High Performance Computing (HPC), Robotics, and Computer Network Security.

Heba K. Aslan
She received her B.Sc. degree, M.Sc. degree and Ph.D. degree in Electronics and Communications Engineering from the Faculty of Engineering, Cairo University, Egypt in 1990, 1994 and 1998 respectively. Aslan has supervised several masters and Ph.D. students in the field of computer networks security. Her research interests include: Key Distribution Protocols, Authentication Protocols, Logical Analysis of Protocols and Intrusion Detection Systems.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »