Title :
Preventing DoS Attack on Hidden Credentials
Author :
Cai, Guoming ; Wang, Yadi ; Wang, Miao ; Gao, Haiying
Author_Institution :
Univ. Zhengzhou, Zhengzhou
Abstract :
Using hidden credentials, strangers in open environments can establish trust without actually disclosing credentials and policies. However, traditional negotiation protocols with hidden credentials are not satisfactory in that they can´t prevent malicious users from tampering negotiation messages or flooding error messages to the recipient. Both of these efforts add the recipient´s computational overhead and can cause denial of service (DoS) attack. In this paper we analyze the weaknesses of a single round protocol using hidden credentials and propose an improved trust negotiation protocol to defense against DoS attack on hidden credentials. The proposed protocol can help the recipient to recognize modified messages and authenticate the sender. We also present detailed security analysis for our protocol, and show that our protocol is secure against tampering and flooding aggression.
Keywords :
protocols; security of data; DoS attack; denial of service attack; trust negotiation protocol; Authentication; Computer crime; Concrete; Cryptographic protocols; Cryptography; Data engineering; Data privacy; Floods; Protection; Security;
Conference_Titel :
Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3016-1
DOI :
10.1109/ISDPE.2007.80