Asymmetric disribution of computations in Internet Key Exchange Protocol

被引:0
|
作者
Karbasioun, Mohammad Mehdi [1 ]
Berenjkub, Mehdi [2 ]
Taji, Bahareh [2 ]
机构
[1] Islamic Azad Univ, Khomeini Shahr, Iran
[2] Isfahan Univ Technol, Esfahan, Iran
关键词
IKEv2; signature; computations; authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IPsec security mechanism standard offers Internet Key Exchange Protocol (IKEv2) for establishing and managing its secure sessions. In IKEv2 both two participants perform the same amount of calculations in all cases and this would cause some deficiencies, when it is used in different situations with different properties. For example in most of client-server connections it is more preferable for servers to do fewer operations in comparison with clients. In the other side in some connections, initiators are entities with less power of computing when comparing with responders. Mobile users are examples of such entities. In these connections, the initiators are the entities who need to perform fewer operations. To solve this problem, we propose two protocols with asymmetric schemes for distribution the calculations. In proposed protocols, one of the participants performs fewer computations, depending on the properties of connections. To achieve this asymmetric scheme, Schnorr signature scheme is used by the entity needs to perform fewer computations.
引用
下载
收藏
页码:1449 / +
页数:2
相关论文
共 50 条
  • [31] Asymmetric Group Key Agreement Protocol Based on Blockchain and Attribute for Industrial Internet of Things
    Li, Juyan
    Qiao, Zhiqi
    Peng, Jialiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) : 8326 - 8335
  • [32] Deniable Internet Key Exchange
    Yao, Andrew C.
    Zhao, Yunlei
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 329 - +
  • [33] MAKE-IT-A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things
    Choudhary, Karanjeet
    Gaba, Gurjot Singh
    Butun, Ismail
    Kumar, Pardeep
    SENSORS, 2020, 20 (18) : 1 - 21
  • [34] LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment
    Tanveer, Muhammad
    Zahid, Amjad Hussain
    Ahmad, Musheer
    Baz, Abdullah
    Alhakami, Hosam
    IEEE ACCESS, 2020, 8 : 155645 - 155659
  • [35] A construction of a key exchange protocol
    Berardi, Luigia
    Rota, Rosaria
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (02): : 171 - 174
  • [36] Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of Things (IoT)
    Jamshiya, P. K.
    Menon, Divya M.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1834 - 1838
  • [37] An Asymmetric Transport Protocol for Internet of Things
    Zhang, Yajun
    He, Jingsha
    Pathan, Muhammad Salman
    ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2017, 107 : 636 - 641
  • [38] A new key exchange protocol
    Majhi, Banshider
    Reddy, Y. Santhosh
    Turuk, A. K.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2006, 1 : 301 - 307
  • [39] Key exchange protocol based on the private key
    Yi, Tong
    Shi, Minyong
    Shang, Wenqian
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 29 - 34
  • [40] A daemon for Multicast Internet Key Exchange
    Aurisch, T
    Karg, C
    LCN 2003: 28TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2003, : 368 - 376