메뉴 건너뛰기




Volumn , Issue , 2009, Pages 128-137

TrueIP: Prevention of IP spoofing attacks using identity-based cryptography

Author keywords

Denial of service; Identity based cryptography; IP spoofing; Network security; Signatures

Indexed keywords

BANDWIDTH CONSUMPTION; CERTIFICATE AUTHORITY; COMPUTATION TIME; DENIAL OF SERVICE ATTACKS; DENIAL-OF-SERVICE; IDENTITY-BASED CRYPTOGRAPHY; IDENTITY-BASED SIGNATURE SCHEME; INTERNET ROUTING; IP ADDRESSS; IP SPOOFING; PUBLIC KEY INFRASTRUCTURE; SIGNATURE GENERATION; SIGNATURES; X.509 CERTIFICATES;

EID: 70350660771     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1626195.1626229     Document Type: Conference Paper
Times cited : (19)

References (24)
  • 2
    • 33749991591 scopus 로고    scopus 로고
    • Lightweight Email Signatures
    • SCN '06: 5th International Conference on Security and Cryptography for Networks, of, Maiori, Italy
    • B. Adida, D. Chau, S. Hohenberger, and R. L. Rivest. Lightweight Email Signatures. In SCN '06: 5th International Conference on Security and Cryptography for Networks, vol. 4116 of Lecture Notes in Computer Science, pp. 288-302, 2006. Maiori, Italy.
    • (2006) Lecture Notes in Computer Science , vol.4116 , pp. 288-302
    • Adida, B.1    Chau, D.2    Hohenberger, S.3    Rivest, R.L.4
  • 5
    • 47649087420 scopus 로고
    • Version 4 Routers, RFC 1812, IETF
    • F. Baker. Requirements for IP Version 4 Routers, 1995. RFC 1812, IETF.
    • (1995) Requirements for IP
    • Baker, F.1
  • 6
    • 3042683432 scopus 로고    scopus 로고
    • Message Authentication Using Hash Functions: The HMAC Construction
    • Spring
    • M. Bellare, R. Canetti, and H. Krawczyk. Message Authentication Using Hash Functions: the HMAC Construction. CryptoBytes, 2(1):12-15, Spring 1996.
    • (1996) CryptoBytes , vol.2 , Issue.1 , pp. 12-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based Encryption from the Weil Pairing
    • D. Boneh and M. Franklin. Identity-based Encryption from the Weil Pairing. SIAM Journal of Computation, 32(3):586-615, 2003.
    • (2003) SIAM Journal of Computation , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 77950151506 scopus 로고    scopus 로고
    • An Identity-based Encryption Scheme Based on Quadratic Residues
    • 8th IMA International Conference on Cryptography and Coding, of
    • C. Cocks. An Identity-based Encryption Scheme Based on Quadratic Residues. In 8th IMA International Conference on Cryptography and Coding, vol. 2260 of Lecture Notes in Computer Science, pp. 360-363, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 9
    • 70350660475 scopus 로고    scopus 로고
    • P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service Usage Guidelines, Sept. 2003. RFC 3580.
    • P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service Usage Guidelines, Sept. 2003. RFC 3580.
  • 10
    • 0034581037 scopus 로고    scopus 로고
    • Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure
    • C. Ellison and B. Schneier. Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. In Computer Security Journal, pages 1-7, 2000.
    • (2000) Computer Security Journal , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 12
    • 52149120953 scopus 로고    scopus 로고
    • CLL: A Cryptographic Link Layer for Local Area Networks
    • SCN '08: 6th International Conference on Security and Cryptography for Networks, of, Amalfi, Italy
    • Y. I. Jerschow, C. Lochert, B. Scheuermann, and M. Mauve. CLL: A Cryptographic Link Layer for Local Area Networks. In SCN '08: 6th International Conference on Security and Cryptography for Networks, vol. 5229 of Lecture Notes in Computer Science, pp. 21-38, 2008. Amalfi, Italy.
    • (2008) Lecture Notes in Computer Science , vol.5229 , pp. 21-38
    • Jerschow, Y.I.1    Lochert, C.2    Scheuermann, B.3    Mauve, M.4
  • 16
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attack and DDoS Defense Mmechanisms
    • New York, NY, USA, ACM Press. Portland, Oregon
    • J. Mirkovic and P. Reiher. A Taxonomy of DDoS Attack and DDoS Defense Mmechanisms. In ACM SIGCOMM, pp. 39-53, New York, NY, USA, 2004. ACM Press. Portland, Oregon.
    • (2004) ACM SIGCOMM , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 18
    • 36949036429 scopus 로고    scopus 로고
    • Protecting Connection Setup from Denial-of-Capability Attacks
    • ACM Press, Kyoto, Japan
    • B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. Maggs, and Y.-C. Hu. Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks. In ACM SIGCOMM, pp. 289-300. ACM Press, 2007. Kyoto, Japan.
    • (2007) ACM SIGCOMM , pp. 289-300
    • Parno, B.1    Wendlandt, D.2    Shi, E.3    Perrig, A.4    Maggs, B.5    Portcullis, Y.-C.H.6
  • 19
    • 34147099073 scopus 로고    scopus 로고
    • Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems
    • T. Peng, C. Leckie, and K. Ramamohanarao. Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys, 39(1):3, 2007.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 3
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 21
    • 0033650584 scopus 로고    scopus 로고
    • Practical Network Support for IP Traceback
    • ACM Press, Stockholm, Sweden
    • S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical Network Support for IP Traceback. In ACM SIGCOMM, pages 295-306. ACM Press, 2000. Stockholm, Sweden.
    • (2000) ACM SIGCOMM , pp. 295-306
    • Savage, S.1    Wetherall, D.2    Karlin, A.3    Anderson, T.4
  • 22
    • 52149087712 scopus 로고    scopus 로고
    • An Identity-based Key Agreement Protocol for the Network Layer
    • SCN '08: 6th International Conference on Security and Cryptography for Networks, of, Amalfi, Italy
    • C. Schridde, M. Smith, and B. Freisleben. An Identity-based Key Agreement Protocol for the Network Layer. In SCN '08: 6th International Conference on Security and Cryptography for Networks, vol. 5229 of Lecture Notes in Computer Science, pp. 409-422, 2008. Amalfi, Italy.
    • (2008) Lecture Notes in Computer Science , vol.5229 , pp. 409-422
    • Schridde, C.1    Smith, M.2    Freisleben, B.3
  • 23
    • 85020598353 scopus 로고
    • Identity-based Cryptosystems and Signature Schemes
    • A. Shamir. Identity-based Cryptosystems and Signature Schemes. CRYPTO 1984 Advances in Crytology, 196:47-53, 1984.
    • (1984) CRYPTO 1984 Advances in Crytology , vol.196 , pp. 47-53
    • Shamir, A.1
  • 24
    • 84910623624 scopus 로고    scopus 로고
    • Domain-based Administration of Identity-based Cryptosystems for Secure E-Mail and IPSEC
    • Berkeley, CA, USA, USENIX Association
    • D. K. Smetters and G. Durfee. Domain-based Administration of Identity-based Cryptosystems for Secure E-Mail and IPSEC. In Proceedings of the 12th USENIX Security Symposium, pages 15-19, Berkeley, CA, USA, 2003. USENIX Association.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 15-19
    • Smetters, D.K.1    Durfee, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.