Improving the security of SNMP in wireless networks

被引:0
|
作者
Otrok, H [1 ]
Mourad, A [1 ]
Debbabi, A [1 ]
Assi, C [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Comp Secur Lab, Montreal, PQ, Canada
关键词
SNMPV3; Diffie-Hellman; certification authority;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Simple network management protocol (SNMP) is widely used for monitoring and managing computers and network devices on wired and wireless network. SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the User-based Security Model (USM). Symmetric cryptography is used for encryption and one-way cryptography is used for authentication. The two keys used for encryption and authentication are derived from the shared password between the manager and agent. In this paper, we are addressing (1) the problem of one way authentication that leads to the man-in-the-middle attack and (2) the vulnerability pertaining to the password update method of SNMPv3. We propose to use certification authority for two-way authentication and Diffie-Hellman algorithm for key exchange to mitigate the impacts of these problems.
引用
收藏
页码:198 / 202
页数:5
相关论文
共 50 条
  • [31] Security in Wireless Sensor Networks
    Aranzazu Suescun, Catalina
    [J]. SISTEMAS & TELEMATICA, 2009, 7 (13): : 43 - 73
  • [32] Security in wireless residential networks
    Krishnamurthy, P
    Kabara, J
    Anusas-amornkul, T
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (01) : 157 - 166
  • [33] Security in Wireless Mesh Networks
    Zarai, Faouzi
    Daly, Ikbel
    Banat, Mohammad M.
    Kamoun, Lotfi
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (11): : 116 - 130
  • [34] Keyless Security in Wireless Networks
    Salah A. Albermany
    Ghazanfar A. Safdar
    [J]. Wireless Personal Communications, 2014, 79 : 1713 - 1731
  • [35] Security in exotic wireless networks
    Farrell, S
    Seigneur, JM
    Jensen, CD
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 101 - 114
  • [36] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66
  • [37] Wireless networks and information security
    Kasimov, S. S.
    Bugibaev, E. N.
    Arzikulov, S. D.
    [J]. 2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 122 - 125
  • [38] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57
  • [39] Security in Wireless Networks: A Tutorial
    Vadlamani, Satish
    Medal, Hugh
    Eksioglu, Burak
    [J]. EXAMINING ROBUSTNESS AND VULNERABILITY OF NETWORKED SYSTEMS, 2014, 37 : 272 - 288
  • [40] Wireless Networks and Security Issues
    Vakil, Farok
    [J]. REVIEW OF BUSINESS, 2005, 26 (03): : 10 - 13