Denial of Services Based Countermeasures Key Exchange Protocols
Keywords:
Cryptography, DoS, Secure Key Exchange Protocol and Digital SignatureAbstract
Cryptography has become indispensable in areas such as e-commerce, the legal safeguarding of medical records, and secures electronic communication. Cryptographic protocols like key exchange usually require expensive computations such as finite field exponentiations or elliptic curve scalar-point multiplications. In an adversarial environment such as the Internet, an attacker could effect a denial of service attack against a server by forcing the server to perform many instances of a cryptographic protocol. To help tackle this challenge, several cryptographic primitives and constructions have been proposed, including mechanisms to securely distribute data over a unidirectional insecure channel, schemes in which leakage of cryptographic keys can be traced back to the leaker, and techniques to combine revocation and tracing capabilities. In this paper we proposed the integration of denial of service countermeasures key exchange protocol by introducing a formal model for denial of service resilience that complements model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client queries and puzzles.
References
N H Ayachit, Santosh L Deshpande, and Kamakshi Prasad V, “Evolutionary Computing based secure key management Protocol”, IEEE 2010.
Abdelouahid Derhab and Nadjib Badache. A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks. IEEE Transactions on Parallel Distributed Systems, 19(7), pp- 926–939, 2008.
Lin Yao, Bing Liu, Kai Yao, Guowei Wu, and Jia Wang, “An ECG-Based Signal Key Establishment Protocol in Body Area Network”, IEEE 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 233-238.
H. Wen, P.-H. Ho, C. Qi, and G. Gong, “Physical layer assisted authentication for distributed ad hoc wireless sensor networks”, IEEE 2010, Special Issue on Multi-Agent & Distributed Information Security, pp. 390-396.
CAO Zheng, YIN Pengpeng, and LU Zhengjun, “A Key Management Scheme for Multicast Based on Layer 2 Control”, IEEE 2010, International Conference on Computer and Information Technology (CIT 2010), pp. 1512-1518.
Jinxia Yu, Yongli Tang, Xiancha Chen and Wenjing Liu, “Choice Mechanism of Proposal Distribution in Particle Filter”, IEEE 2010, Proceedings of the 8th World Congress on Intelligent Control and Automation, pp. 1051-1056.
Jinxia Yu, Yongli Tang, Xiancha Chen and Wenjing Liu, “Choice Mechanism of Proposal Distribution in Particle Filter”, IEEE 2010, Proceedings of the 8th World Congress on Intelligent Control and Automation, pp. 1051-1056.
FengHe and Kuan Hao, Hao Ma, “S-MAODV:A Trust Key Computing Based Secure Multicast Ad-hoc On Demand Vector Routing Protocol”, IEEE 2010, pp. 434-438.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.