Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment

被引:4
|
作者
Almuflih, Ali Saeed [1 ]
Popat, Khushi [2 ,3 ]
Kapdia, Viral V. [3 ]
Qureshi, Mohamed Rafik Noor Mohamed [1 ]
Almakayeel, Naif [1 ]
Al Mamlook, Rabia Emhamed [4 ]
机构
[1] King Khalid Univ, Ind Engn Dept, Abha 62529, Saudi Arabia
[2] Charotar Univ Sci & Technol CHARUSAT, Fac Technol & Engn FTE, Devang Patel Inst Adv Technol & Res DEPSTAR, Dept Comp Engn, CHARUSAT Campus, Anand 388421, Gujarat, India
[3] Maharaja Sayajirao Univ Baroda, Comp Sci & Engn Dept, Vadodara 390002, India
[4] Al Zawiya Univ, Dept Aeronaut Engn, POB 16418, Al Zawiya City, Libya
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 15期
关键词
multipath TCP (MPTCP); security; ADD_ADDR attack; off-path attacks; identity-based encryption (IBE); man-in-the-middle attack; session hijacking;
D O I
10.3390/app12157575
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the demand for low-latency communication networks. The fourth-generation (4G)/long-term evolution (LTE)/ fifth-generation (5G) communication technology offers higher bandwidth and low latency services, but resource utilization and resiliency cannot be achieved, as transmission control protocol (TCP) is the most common choice for most of the state-of-art applications for the transport layer. An extension of TCP-multipath TCP (MPTCP)-offers higher bandwidth, resiliency, and stable connectivity by offering bandwidth aggregation and smooth handover among multiple paths. However, MPTCP uses multiple disjointed paths for communication to offer multiple benefits. A breach in the security of one of the paths may have a negative effect on the overall performance, fault-tolerance, robustness, and quality of service (QoS). In this paper, the research focuses on how MPTCP options such as MP_CAPABLE, ADD_ADDR, etc., can be used to exploit the vulnerabilities to launch various attacks such as session hijacking, traffic diversion, etc., to compromise the availability, confidentiality, and integrity of the data and network. The probable security solutions for securing MPTCP connections are analyzed, and the secure key exchange model for MPTCP (SKEXMTCP) based on identity-based encryption (IBE) is proposed and implemented. The parameters exchanged during the initial handshake are encrypted using IBE to prevent off-path attacks by removing the requirement for key exchange before communication establishment by allowing the use of arbitrary strings as a public key for encryption. The experiments were performed with IBE and an elliptic curve cryptosystem (ECC), which show that IBE performs better, as it does not need to generate keys while applying encryption. The experimental evaluation of SKEXMTCP in terms of security and performance is carried out and compared with existing solutions.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Hongyong Jia
    Yue Chen
    Julong Lan
    Kaixiang Huang
    Jun Wang
    International Journal of Information Security, 2018, 17 : 477 - 490
  • [22] Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
    Jia, Hongyong
    Chen, Yue
    Lan, Julong
    Huang, Kaixiang
    Wang, Jun
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 477 - 490
  • [23] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434
  • [24] An Identity-Based Key-Exchange Protocol
    ZHANG Ya-juan
    Wuhan University Journal of Natural Sciences, 2005, (01) : 235 - 238
  • [25] AN IDENTITY-BASED KEY-EXCHANGE PROTOCOL
    GUNTHER, CG
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 29 - 37
  • [26] Key Exchange Using Biometric Identity Based Encryption For Sharing Encrypted Data In Cloud Environment
    Hassan, Waleed K.
    Al-Assam, Hisham
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2017, 2017, 10221
  • [27] Efficient identity-based encryption with tight security reduction
    Attrapadung, Nuttapong
    Furukawa, Jun
    Gomi, Takeshi
    Hanaoka, Goichiro
    Imai, Hideki
    Zhang, Rui
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (09) : 1803 - 1813
  • [28] Efficient Identity-Based Encryption over NTRU Lattices
    Ducas, Leo
    Lyubashevsky, Vadim
    Prest, Thomas
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 22 - 41
  • [29] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919
  • [30] An Efficient Identity-Based Online/Offline Encryption Scheme
    Liu, Joseph K.
    Zhou, Jianying
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 156 - 167