Secure electronic commerce: building the infrastructure for digital signatures and encryption
Secure electronic commerce: building the infrastructure for digital signatures and encryption
Handbook of Applied Cryptography
Handbook of Applied Cryptography
PKI: Implementing and Managing E-Security
PKI: Implementing and Managing E-Security
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack
ICICS '99 Proceedings of the Second International Conference on Information and Communication Security
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Towards Network Denial of Service Resistant Protocols
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
Proceedings of the Third International Workshop on Fast Software Encryption
A Novel JavaCard-Based Authentication System for Secured Transactions on the Internet
ICON '00 Proceedings of the 8th IEEE International Conference on Networks
Performance of Public-Key-Enabled Kerberos Authentication in Large Networks
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Denial-of-service resilience password-based group key agreement for wireless networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Wireless client puzzles in IEEE 802.11 networks: security by wireless
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Denial-of-service resistance in key establishment
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Network Denial-of-Service (DoS) attacks, which exhaust server resources and network bandwidth, can cause the target servers to be unable to provide proper services to the legitimate users and in some cases render the target systems inoperable and/or the target networks inaccessible. DoS attacks have now become a serious and common security threat to the Internet community. Public Key Infrastructure (PKI) has long been incorporated in various authentication protocols to facilitate verifying the identities of the communicating parties. The use of PKI has, however, an inherent problem as it involves expensive computational operations such as modular exponentiation. An improper deployment of the public-key operations in a protocol could create an opportunity for DoS attackers to exhaust the server's resources. This paper presents a public-key based authentication and key establishment protocol coupled with a sophisticated client puzzle, which together provide a versatile solution for possible DoS attacks and various other common attacks during an authentication process. Besides authentication, the protocol also supports a joint establishment of a session key by both the client and the server, which protects the session communications after the mutual authentication. The proposed protocol has been validated using a formal logic theory and has been shown, through security analysis, to be able to resist, besides DoS attacks, various other common attacks.