Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols

被引:0
|
作者
Tritilanunt, Suratose [1 ]
机构
[1] Mahidol Univ, Fac Engn, Dept Comp Engn, Phuttamonthol 73170, Nakornpathom, Thailand
关键词
LATTICE REDUCTION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We provides an evaluation of non-parallelizable puzzles used to prevent DoS in authentication protocols. With an evaluation based on a simulation and performance analysis, this approach helps a responder to resist against DoS, as well as improves the throughput of services for legitimate clients. Another key strength is that the construction and verification at the responder is simple and fast.
引用
收藏
页码:358 / 365
页数:8
相关论文
共 19 条
  • [1] Toward non-parallelizable client puzzles
    Tritilanunt, Suratose
    Boyd, Colin
    Foo, Ernest
    Nieto, Juan Manuel Gonzalez
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 247 - 264
  • [2] Modular square root puzzles: Design of non-parallelizable and non-interactive client puzzles
    Jerschow, Yves Igor
    Mauve, Martin
    [J]. COMPUTERS & SECURITY, 2013, 35 : 25 - 36
  • [3] Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems
    Arnaboldi, Luca
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 224 - 233
  • [4] The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles
    Hwang, Min-Shiang
    Chong, Song-Kong
    Ou, Hsia-Hung
    [J]. INFORMATICA, 2016, 27 (01) : 31 - 48
  • [5] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [6] Client Puzzles Based on Quasi Partial Collisions Against DoS Attacks in UMTS
    Lei, Yaohui
    Pierre, Samuel
    Quintero, Alejandro
    [J]. 2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 2464 - 2468
  • [7] DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols
    Chien, Hung-Yu
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 615 - 622
  • [8] Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance
    Chien, Hung-Yu
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 607 - 614
  • [9] Attacks on quantum key distribution protocols that employ non-ITS authentication
    C. Pacher
    A. Abidin
    T. Lorünser
    M. Peev
    R. Ursin
    A. Zeilinger
    J.-Å. Larsson
    [J]. Quantum Information Processing, 2016, 15 : 327 - 362
  • [10] Attacks on quantum key distribution protocols that employ non-ITS authentication
    Pacher, C.
    Abidin, A.
    Loruenser, T.
    Peev, M.
    Ursin, R.
    Zeilinger, A.
    Larsson, J. -A.
    [J]. QUANTUM INFORMATION PROCESSING, 2016, 15 (01) : 327 - 362