【24h】

On the Power of Impersonation Attacks

机译:模仿攻击的威力

获取原文
获取原文并翻译 | 示例

摘要

In the standard message passing models it is assumed that the identity of a sender is known to the receiver. In practice, this often is not the case, due to impersonation attacks by malicious adversaries. Various impersonation attack schemes have been extensively investigated in the context of network security or cryptography, in particular for peep-to-peer and sensor networks [4,5]. Here, we study this problem in the context of distributed computing theory.Consider a set of n processors, p_1,...,p_n, communicating by means of point-to-point message passing between every pair of processors. Assume that the message sender is identified by including its id in the message. For simplicity the communication is assumed to be synchronous. The adversary is an external entity capable of injecting messages with arbitrary content into the network (but it is incapable of preventing the processors from receiving each other's messages). The ids of the processors are assumed to be fixed and known a priori, thus injecting messages that impersonate the real processors is the only way by which the adversary can interfere with the computation. Adversarial behavior of this kind is known as stolen identities Sybil attack [4,5]. For the purpose of formal analysis, the strength of the adversary is quantified by the number of messages it is able to send to each processor in every round. A k-adversary can generate up to k messages for every processor, so that a processor can receive up to n + k messages in a round, instead of just n correct messages. This formulation includes the particular cases of an adversary that in every round can impersonate some specific k processors, or of a system with n + k processors, k of which are Byzantine, capable of sending messages with arbitrary ids and content.
机译:在标准消息传递模型中,假定发送者的身份对于接收者是已知的。实际上,由于恶意对手的冒名攻击,通常不是这种情况。在网络安全性或密码学的背景下,已对各种模拟攻击方案进行了广泛的研究,特别是对对等网络和传感器网络[4,5]。在这里,我们在分布式计算理论的背景下研究此问题。考虑一组n个处理器p_1,...,p_n,它们通过在每对处理器之间传递的点对点消息进行通信。假定通过在消息中包含其ID来标识消息发件人。为了简单起见,假定通信是同步的。对手是一个外部实体,能够将带有任意内容的消息注入网络(但是无法阻止处理器接收彼此的消息)。假定处理器的ID是固定的,并且是先验已知的,因此,注入模拟真实处理器的消息是攻击者可以干扰计算的唯一方法。这种对抗行为被称为身份盗窃Sybil攻击[4,5]。出于形式分析的目的,对手的实力由它能够在每一轮中发送给每个处理器的消息数量来量化。一个k对手可以为每个处理器最多生成k条消息,因此一个处理器在一轮中最多可以接收n + k条消息,而不仅仅是n条正确的消息。这种表述包括对手的特殊情况,这些对手在每个回合中都可以模拟某些特定的k个处理器,或者具有n + k个处理器的系统,其中k个是拜占庭式,能够发送具有任意id和内容的消息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号