271-276Conventional key based authentication system normally associated with block cipher and allows the sender to send the packets with signature scheme. The relationship between the packets makes them vulnerable to packet loss, which is inherent in the internet and wireless networks. In addition, the lack of Denial of Service (DOS) resilience renders most of them vulnerable to packet injection in the hostile environments. In this paper we propose an Agent Based Secure Multicast Authentication (ABSMA) which utilizes the public key encryption in batch signature with efficient fast hashing algorithm. Our agent based architecture used for the identification of packet loss and injection and allows the host to resend the particular pac...
Recent multi agent systems are characterized by decentralized control, autonomy and local views. The...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Wired embedded networks must include multicast authentication to prevent masquerade attacks within t...
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by...
Traditional multicast authentication schemes manage the different involvement of the receivers by le...
Authentication is one of the decisive subjects in protecting multicast in a situation attractive to ...
Today there is a widening in digital technologies and increasing in new multimedia services like: pa...
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic mu...
AbstractToday there is a widening in digital technologies and increasing in new multimedia services ...
Authentication is an important security measure for multicast applications, providing receivers with...
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated envi...
Ad-hoc network is a dynamic wireless network, composed of mobile nodes without the aid of centralize...
Agent communication security has been a subject of much research in the recent past motivated by the...
We describe a novel method for authenticating multicast packets that is robust against packet loss. ...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
Recent multi agent systems are characterized by decentralized control, autonomy and local views. The...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Wired embedded networks must include multicast authentication to prevent masquerade attacks within t...
Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by...
Traditional multicast authentication schemes manage the different involvement of the receivers by le...
Authentication is one of the decisive subjects in protecting multicast in a situation attractive to ...
Today there is a widening in digital technologies and increasing in new multimedia services like: pa...
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic mu...
AbstractToday there is a widening in digital technologies and increasing in new multimedia services ...
Authentication is an important security measure for multicast applications, providing receivers with...
This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated envi...
Ad-hoc network is a dynamic wireless network, composed of mobile nodes without the aid of centralize...
Agent communication security has been a subject of much research in the recent past motivated by the...
We describe a novel method for authenticating multicast packets that is robust against packet loss. ...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
Recent multi agent systems are characterized by decentralized control, autonomy and local views. The...
Abstract: "When large Multi Agent Systems operate over open platforms such as the Internet, there is...
Wired embedded networks must include multicast authentication to prevent masquerade attacks within t...