DoS Protection for Reliably Authenticated Broadcast

نویسندگان

  • Carl A. Gunter
  • Sanjeev Khanna
  • Kaijun Tan
  • Santosh S. Venkatesh
چکیده

Authenticating broadcast packet communications poses a challenge that cannot be addressed efficiently with public key signatures on each packet, or securely with the use of a pre-distributed shared secret key, or practically with unicast tunnels. Unreliability is an intrinsic problem: many broadcast protocols assume that some information will be lost, making it problematic to amortize the cost of a single public key signature across multiple packets. Forward Error Correction (FEC) can compensate for loss of packets, but denial of service risks prevent the naive use of both public keys and FEC in authentication. In this paper we introduce a protocol, Broadcast Authentication Streams (BAS), that overcomes these barriers and provides a simple and efficient scheme for authenticating broadcast packet communications based on a new technique called selective verification. We analyze BAS theoretically, experimentally, and architecturally. Our prototype implementation realizes processing throughput of 200Mbps with a bandwidth overhead of less than 3% on channels with losses of up to 40% and handles signature flood attacks of more than 100Mbps on stock PCs. It achieves this based on public key signatures with a confidence of authentication of more than 99%.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack

|Key-agreement protocol will play an important role as an entrance to secure communication over the Internet. Speci cally, ISAKMP(Internet Security Association and Key Management Protocol)/Oakley key-agreement is currently a leading approach for communication between two parties. Basic idea of ISAKMP/Oakley is an authenticated Di eHellman (DH) key-agreement protocol. This authentication owes a ...

متن کامل

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

A Tree-Based μTESLA Broadcast Authentication for Sensor Networks

Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. μTESLA and multi-level μTESLA have been proposed to provide such service for sensor networks. However, none of these techniques are scalable in terms of the number of senders. Though multi-level μTESLA schemes can scale up to large senso...

متن کامل

A DOS-based POset implementation

In this paper, we describe and discuss a DOS based POset (i.e. Partially Ordered Set) implementation. We begin with a short review of previous results on POset based protection. We then describe implementation details of POset based protection under DOS. Next we discuss management tools used to implement and control the protection system. Then we describe the problems encountered in integration...

متن کامل

Analysis of En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks

In wireless sensor networks, adversaries can injectfalse data reports via compromised nodes and launch DoS attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneous...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004