ACM Transactions on Computer Systems (TOCS)
Elements of network protocol design
Elements of network protocol design
Internet security attacks at the basic levels
ACM SIGOPS Operating Systems Review
TARP: Ticket-based address resolution protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
CLL: A Cryptographic Link Layer for Local Area Networks
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Research of the ARP spoofing principle and a defensive algorithm
WSEAS TRANSACTIONS on COMMUNICATIONS
Research of the ARP spoofing principle and a defensive algorithm
WSEAS TRANSACTIONS on COMMUNICATIONS
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Protection of LAN-wide, P2P interactions: a holistic approach
International Journal of Communication Networks and Distributed Systems
An active intrusion detection system for LAN specific attacks
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
A novel algorithm to prevent man in the middle attack in LAN environment
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
A security architecture for protecting LAN interactions
ISC'06 Proceedings of the 9th international conference on Information Security
A client/server based mechanism to prevent ARP spoofing attacks
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part II
Hi-index | 0.00 |
We propose an architecture for securely resolving IP addresses into hardware addresses over an Ethernet. The proposed architecture consists of a secure server connected to the Ethernet and two protocols: an invite-accept protocol and a request-reply protocol. Each computer connected to the Ethernet can use the invite-accept protocol to periodically record its IP address and its hardware address in the database of the secure server. Each computer can later use the request-reply protocol, to obtain the hardware address of any other computer connected to the Ethernet from the database of the secure server. These two protocols are designed to overcome the actions of any adversary that can lose sent messages, arbitrarily modify the fields of sent messages, and replay old messages.