OSUOLALE FESTUS ADEYINKA  picture
OSUOLALE FESTUS ADEYINKA

Publication

Publisher:
 Infonomics Society
Publication Type:
 Journal
Publication Title:
 A Robust Multicast Authentication Scheme Based OnAsymmetric Key Signature
Publication Authors:
 Opayinka C. A, Alese B. K, Thompson A. F, Alowolodu O. D And Osuolale, A. Festus
Year Published:
 2014
Abstract:

Multicast packets authentication major challenges are high computation overhead incurred while signing multicast streams and authentication difficulty when there is one or more packet losses. In this paper, Information Dispersal Algorithm was used to construct the hash of each packet with the hash values of individual packets concatenated over multiple packets. Authentication scheme for Multicast message packets design was based on signature amortization technique. This reduces the computation overhead and ensures verification when there is packet loss. The design was simulated with a number of messages sent to a chosen number of receivers. Probabilities of loss were calculated for each transmission. The performance was compared with three other existing schemes to ascertain its efficiency. It was observed that our technique is efficient in packets authentication in a lossy environment especially with reduced space overhead.

 
Publisher:
 ICITST
Publication Type:
 Journal
Publication Title:
 Evaluation Of Information Security Risks Using Hybrid Assessment Model”. The 9th International Conference For Internet Technology And Secured Transactions
Publication Authors:
 Alese B. K, Oyebade O, Osuolale, A. Festus, Iyare O, And Thompson A.
Year Published:
 2014
Abstract:

A risk is the possibility that an undesirable event could happen. Several risk management software tools have been developed in the past to address pressing industrial concerns such as risk identification and estimation, risk exposure, mitigation and keep track of risk positions and respective management plans. Several methods have been developed and used in risk assessments. Two specific methods of interest in this work are: “Risk Matrices” and “Risk Registers”. A generic Risk Register application module and an updatable Risk Matrix module was designed. This work studies risk management techniques and employs a custom model for the automated assessment of IS risks. This model was implemented in phases corresponding to its aspects. The “Assessment methods” of interest to this work are Risk Registers, Risk Matrices and the Scenario Geek”. What-if analysis is a data-intensive simulation whose goal is to inspect the behavior of a complex system under some given hypotheses called scenarios. What-ifs are used to generate qualitative descriptions of potential problems in the form of questions and responses lists of recommendations for preventing problems. The Risk Assessor was developed using Microsoft’s Visual Basic.Net with Active Server Pages (ASP.Net) Technologies on .Net Framework 4.0. This work, if adopted will help keep track of the basic sources which can hamper the operations of the information technology organizations.

 
Publisher:
 Infonomics Society
Publication Type:
 Journal
Publication Title:
 A Multicast Packet Authentication Using Signature Amortization Scheme
Publication Authors:
 C.A. Opayinka, B.K. Alese, A. F. Thompson, O. D. Alowolodu, Festus A. Osuolale
Year Published:
 2014
Abstract:

The major principle of multicast communication is that each data packet sent from one source must reach all the receivers exactly as it originates from the source without any modification on the way. For information to be authentic there is the need to ensure that the information is from where they claim to come from and that security requirements are put in place. In multicast applications, when there are packet losses, the authenticity of the packet will not be verifiable by the receiver, making authentication impossible. In view of this, there is a need to develop an authentication scheme with lower communication cost and one that can be verifiable when packet loss is high. Thus, this research work developed a multicast authentication scheme that makes verification possible when there is packet loss and minimizes the size of the communication overhead. The research simulates a network environment using C sharp programming language and was tested with different messages to a number of receivers. The program was implemented in two phases: the sender’s end and the receiver’s end. The results show that amortization technique assists in reconstruction of the packet and make verification possible even when there are high losses of packets.