A Denial-of-Service Resistant Public-key Authentication and Key Establishment Protocol
نویسنده
چکیده
Network denial-ofservice attacks, which exhaust the server resources, have become a serious security threat to the Internet. Public Key Infrastructure (PU) has long been introduced in various authentication protocols to verifL the identities of the communicating parties. Although the use of PKI can present dijjculty to the denial-of service attackers, the underlying problem has not been resolved completely, because the use of public-key infrastructure involves computationally expensive operations such as modular exponentiation. An improper deployment of the public-key operations in a protocol allows the attacker to exhaust the server's resources. This paper presents a public-key based authentication and key establishment protocol integrated with a sophisticated client puzzle, which together provides a good solution for network denial-ofservice attacks, and various other common attacks. The joint establishment of session keys by both the client and the server protects the session after the mutual authentication. The basic strategv to protect against denial of service is to impose an adjustable cost on the attacker while launching the attacks, The proposed client puzzle protocol can also be integrated with other network protocols to protect against denial-ofsewice attacks.
منابع مشابه
Protocol Engineering for Protection against Denial-of-Service Attacks
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service unavailability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries flood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a si...
متن کاملAnalysis and Improvement of a User Authentication Improved Protocol
Remote user authentication always adopts the method of password to login the server within insecure network environments. Recently, Peyravin and Jeffries proposed a practical authentication scheme based on oneway collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. In order to remove the weakness, Hölbl, W...
متن کاملResolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack
|Key-agreement protocol will play an important role as an entrance to secure communication over the Internet. Speci cally, ISAKMP(Internet Security Association and Key Management Protocol)/Oakley key-agreement is currently a leading approach for communication between two parties. Basic idea of ISAKMP/Oakley is an authenticated Di eHellman (DH) key-agreement protocol. This authentication owes a ...
متن کاملBLIND: A Complete Identity Protection Framework for End-points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authenticated Diffie-Hellman key exchange protocol that identifies the end-points to each other and creates a security association between the peers. The protocol hides the public key based identifiers from attackers and e...
متن کاملSecurity Review of the Light-Weight Access Point Protocol draft-ohara-capwap-lwapp-02
This document introduces the LWAPP protocol and provides an analysis of its security features. In particular, the public-key authentication, preshared-key authentication, and packet-level encryption are examined. Also, the security ramifications introduced by the IEEE 802.11 binding are reviewed. Lastly, recommendations on changes the the protocol are presented. Overall, LWAPP is “secure”. Howe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004