What is it about?

Identity-based cryptograph, Network layer, iAP

Featured Image

Why is it important?

The IP protocol does not verify the source address at the beginning of its design. Attackers use this to forge deceive packets byfake source addresses, and even launch a large number of DDOSattacks. Unfortunately, current proposed solutions either do notsolve the source address spoofng problem truly or require a lot of network overhead. This paper proposes an identity-based authentication protocol (iAP) for trusted IP address verifcation.

Perspectives

The IP protocol does not verify the source address at the beginning of its design. Attackers use this to forge deceive packets byfake source addresses, and even launch a large number of DDOSattacks. Unfortunately, current proposed solutions either do notsolve the source address spoofng problem truly or require a lot of network overhead. This paper proposes an identity-based authentication protocol (iAP) for trusted IP address verifcation. iAP usesidentity-based message authentication codes and serial numbersto achieve message authenticity and integrity verifcation, with forward secrecy. The use of IBC to implement address or publickey technology reduces network overhead by verifying the IP address without relying on certifcates or public key infrastructure.Through the analysis in this paper, iAP has good performances suchas resistance to- replay attacks and resistance to man-in-the-middle attacks. Experiments show that compared with IPSec, the networkoverhead of iAP is almost 0.4 of IPSec.

wxy wxy

Read the Original

This page is a summary of: Identity-Based Authentication Protocol for Trustworthy IP Address, December 2022, ACM (Association for Computing Machinery),
DOI: 10.1145/3586102.3586111.
You can read the full text:

Read

Contributors

The following have contributed to this page