Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment

被引:4
|
作者
Almuflih, Ali Saeed [1 ]
Popat, Khushi [2 ,3 ]
Kapdia, Viral V. [3 ]
Qureshi, Mohamed Rafik Noor Mohamed [1 ]
Almakayeel, Naif [1 ]
Al Mamlook, Rabia Emhamed [4 ]
机构
[1] King Khalid Univ, Ind Engn Dept, Abha 62529, Saudi Arabia
[2] Charotar Univ Sci & Technol CHARUSAT, Fac Technol & Engn FTE, Devang Patel Inst Adv Technol & Res DEPSTAR, Dept Comp Engn, CHARUSAT Campus, Anand 388421, Gujarat, India
[3] Maharaja Sayajirao Univ Baroda, Comp Sci & Engn Dept, Vadodara 390002, India
[4] Al Zawiya Univ, Dept Aeronaut Engn, POB 16418, Al Zawiya City, Libya
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 15期
关键词
multipath TCP (MPTCP); security; ADD_ADDR attack; off-path attacks; identity-based encryption (IBE); man-in-the-middle attack; session hijacking;
D O I
10.3390/app12157575
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the demand for low-latency communication networks. The fourth-generation (4G)/long-term evolution (LTE)/ fifth-generation (5G) communication technology offers higher bandwidth and low latency services, but resource utilization and resiliency cannot be achieved, as transmission control protocol (TCP) is the most common choice for most of the state-of-art applications for the transport layer. An extension of TCP-multipath TCP (MPTCP)-offers higher bandwidth, resiliency, and stable connectivity by offering bandwidth aggregation and smooth handover among multiple paths. However, MPTCP uses multiple disjointed paths for communication to offer multiple benefits. A breach in the security of one of the paths may have a negative effect on the overall performance, fault-tolerance, robustness, and quality of service (QoS). In this paper, the research focuses on how MPTCP options such as MP_CAPABLE, ADD_ADDR, etc., can be used to exploit the vulnerabilities to launch various attacks such as session hijacking, traffic diversion, etc., to compromise the availability, confidentiality, and integrity of the data and network. The probable security solutions for securing MPTCP connections are analyzed, and the secure key exchange model for MPTCP (SKEXMTCP) based on identity-based encryption (IBE) is proposed and implemented. The parameters exchanged during the initial handshake are encrypted using IBE to prevent off-path attacks by removing the requirement for key exchange before communication establishment by allowing the use of arbitrary strings as a public key for encryption. The experiments were performed with IBE and an elliptic curve cryptosystem (ECC), which show that IBE performs better, as it does not need to generate keys while applying encryption. The experimental evaluation of SKEXMTCP in terms of security and performance is carried out and compared with existing solutions.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Non-Interactive Key Exchange from Identity-Based Encryption
    Blazy, Olivier
    Chevalier, Celine
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [2] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    INFORMATION SCIENCES, 2018, 465 : 248 - 264
  • [3] Identity-based Encryption with Efficient Revocation
    Boldyreva, Alexandra
    Goyal, Vipul
    Kumar, Virendra
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 417 - 426
  • [4] Efficient identity-based authenticated multiple key exchange protocol
    Chen, Yitao
    Han, Weiwei
    ACTA SCIENTIARUM-TECHNOLOGY, 2013, 35 (04) : 629 - 636
  • [5] Efficient identity-based authenticated multiple key exchange protocol
    Tan, Zuowen
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 191 - 198
  • [6] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [7] Key updating technique in identity-based encryption
    Liu, Shengli
    Long, Yu
    Chen, Kefei
    INFORMATION SCIENCES, 2011, 181 (11) : 2436 - 2440
  • [8] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Emura, Keita
    Takayasu, Atsushi
    Watanabe, Yohei
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (10) : 2397 - 2431
  • [9] Efficient identity-based encryption with Hierarchical key-insulation from HIBE
    Keita Emura
    Atsushi Takayasu
    Yohei Watanabe
    Designs, Codes and Cryptography, 2021, 89 : 2397 - 2431
  • [10] Broadcast encryption using identity-based public-key cryptosystem
    Lv, XX
    Yang, B
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1092 - 1097