...
首页> 外文期刊>International Journal of Network Management >Efficient authenticated key agreement protocols resistant to a denial-of-service attack
【24h】

Efficient authenticated key agreement protocols resistant to a denial-of-service attack

机译:高效的经过身份验证的密钥协商协议,可抵抗拒绝服务攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Malicious intruders may launch as many invalid requests as possible without establishing a server connection to bring server service to a standstill. This is called a denial-of-service (DoS) or distributed DoS (DDoS) attack. Until now, there has been no complete solution to resisting a DoS/DDoS attack. Therefore, it is an important network security issue to reduce the impact of a DoS/DDoS attack. A resource-exhaustion attack on a server is one kind of denial-of-service attack. In this article we address the resource-exhaustion problem in authentication and key agreement protocols. The resource-exhaustion attack consists of both the CPU-exhaustion attack and the storage-exhaustion attack. In 2001, Hirose and Matsuura proposed an authenticated key agreement protocol (AKAP) that was the first protocol simultaneously resistant to both the CPU-exhaustion attack and the storage-exhaustion attack. However, their protocol is time-consuming for legal users in order to withstand the DoS attack. Therefore, in this paper, we propose a slight modification to the Hirose-Matsuura protocol to reduce the computation cost. Both the Hirose-Matsuura and the modified protocols provide implicit key confirmation. Also, we propose another authenticated key agreement protocol with explicit key confirmation. The new protocol requires less computation cost. Because DoS/DDoS attacks come in a variety of forms, the proposed protocols cannot fully disallow a DoS/DDoS attack. However, they reduce the effect of such an attack and thus make it more difficult for the attack to succeed.
机译:恶意入侵者可能会建立尽可能多的无效请求,而不会建立服务器连接以使服务器服务停止。这称为拒绝服务(DoS)或分布式DoS(DDoS)攻击。到目前为止,还没有完整的解决方案来抵抗DoS / DDoS攻击。因此,减少DoS / DDoS攻击的影响是重要的网络安全问题。服务器上的资源耗尽攻击是一种拒绝服务攻击。在本文中,我们解决了身份验证和密钥协商协议中的资源耗尽问题。资源枯竭攻击包括CPU枯竭攻击和存储枯竭攻击。在2001年,Hirose和Matsuura提出了一种经过认证的密钥协商协议(AKAP),它是第一个同时抵抗CPU耗尽攻击和存储耗尽攻击的协议。但是,它们的协议对于合法用户来说很费时,以抵御DoS攻击。因此,在本文中,我们建议对Hirose-Matsuura协议进行一些修改,以降低计算成本。 Hirose-Matsuura和修改后的协议都提供隐式密钥确认。此外,我们提出了另一种带有显式密钥确认的已认证密钥协商协议。新协议需要较少的计算成本。由于DoS / DDoS攻击有多种形式,因此建议的协议无法完全禁止DoS / DDoS攻击。但是,它们降低了这种攻击的影响,因此使攻击成功更加困难。

著录项

  • 来源
    《International Journal of Network Management》 |2005年第3期|p.193-202|共10页
  • 作者

    Yuh-Min Tseng;

  • 作者单位

    Information Security Laboratory, Department of Mathematics, National Changhua University of Education, Jin-De Campus, Chang-Hua 500, Taiwan;

  • 收录信息 美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 TN913.2;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号