Asymmetric disribution of computations in Internet Key Exchange Protocol

被引:0
|
作者
Karbasioun, Mohammad Mehdi [1 ]
Berenjkub, Mehdi [2 ]
Taji, Bahareh [2 ]
机构
[1] Islamic Azad Univ, Khomeini Shahr, Iran
[2] Isfahan Univ Technol, Esfahan, Iran
关键词
IKEv2; signature; computations; authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IPsec security mechanism standard offers Internet Key Exchange Protocol (IKEv2) for establishing and managing its secure sessions. In IKEv2 both two participants perform the same amount of calculations in all cases and this would cause some deficiencies, when it is used in different situations with different properties. For example in most of client-server connections it is more preferable for servers to do fewer operations in comparison with clients. In the other side in some connections, initiators are entities with less power of computing when comparing with responders. Mobile users are examples of such entities. In these connections, the initiators are the entities who need to perform fewer operations. To solve this problem, we propose two protocols with asymmetric schemes for distribution the calculations. In proposed protocols, one of the participants performs fewer computations, depending on the properties of connections. To achieve this asymmetric scheme, Schnorr signature scheme is used by the entity needs to perform fewer computations.
引用
下载
收藏
页码:1449 / +
页数:2
相关论文
共 50 条
  • [21] Multi level key exchange and encryption protocol for internet of things(IoT)
    Poomagal, C.T. (ctpoomagall@gmail.com), 1600, Tech Science Press (35):
  • [22] Multi level Key Exchange and Encryption Protocol for Internet of Things(IoT)
    Poomagal, C. T.
    Kumar, Sathish G. A.
    Mehta, Deval
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2020, 35 (01): : 51 - 63
  • [23] Multi level key exchange and encryption protocol for internet of things(loT)
    Poomagal, C.T. (ctpoomagall@gmail.com), 1600, CRL Publishing (35):
  • [24] An asymmetric group key agreement protocol based on attribute threshold for Internet of Things
    Gan, Yong
    Wang, Bingli
    Zhuang, Yuan
    Gao, Yuan
    Li, Zhigang
    Zhang, Qikun
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [25] Blockchain-based asymmetric group key agreement protocol for internet of vehicles
    Zhang, Qikun
    Li, Yongjiao
    Wang, Ruifang
    Li, Jianyong
    Gan, Yong
    Zhang, Yanhua
    Yu, Xiao
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
  • [26] On a Key Exchange Protocol
    Barcau, Mugurel
    Pasol, Vicentiu
    Plesca, Cezar
    Togan, Mihai
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 187 - 199
  • [27] A Universally Composable Key Exchange Protocol for Advanced Metering Infrastructure in the Energy Internet
    Sani, Abubakar Sadiq
    Yuan, Dong
    Bao, Wei
    Dong, Zhao Yang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (01) : 534 - 546
  • [28] Contribution to enhance IPSec security by a safe and efficient internet key exchange protocol
    Marwa, Ahmim
    Malika, Babes
    Nacira, Ghoualmi
    WORLD CONGRESS ON COMPUTER & INFORMATION TECHNOLOGY (WCCIT 2013), 2013,
  • [29] An Intelligent Internet Key Exchange Protocol Resistant to Denial-of-Service Attacks
    Su, Ming-Yang
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (05): : 681 - 690
  • [30] TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things
    Khelf, Roumaissa
    Ghoualmi-Zine, Nacira
    Ahmim, Marwa
    INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2020, 11 (03): : 1 - 21