New DoS Defense Method Based on Strong Designated Verifier Signatures.

Sensors (Basel)

Department of Convergence Security, Sungshin Women's University, 249-1 Dongseon-Dong 3-ga, Seoul 136-742, Korea.

Published: August 2018

We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism, named packet level authentication (PLA), can be an essential tool for addressing Denial of Service (DoS) attacks. Based on designated verifier signature schemes, our proposal is an appropriate and unprecedented solution applying digital signatures for DoS prevention. Our scheme does not rely on an expensive public-key infrastructure and makes use of light cryptography machinery that is suitable in the context of the Internet of Things (IoT). We analyze our proposed scheme as a defense measure considering known DoS attacks and present a formal proof of its resilience face to eventual adversaries. Furthermore, we compare our solution to already existent strategies, highlighting its advantages and drawbacks.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6163848PMC
http://dx.doi.org/10.3390/s18092813DOI Listing

Publication Analysis

Top Keywords

designated verifier
8
dos attacks
8
dos
4
dos defense
4
defense method
4
method based
4
based strong
4
strong designated
4
verifier signatures
4
signatures novel
4

Similar Publications

In an attribute-based strong designated verifier signature, a signer who satisfies the access structure signs the message and assigns it to a verifier who satisfies the access structure to verify it, which enables fine-grained access control for signers and verifiers. Such signatures are used in scenarios where the identity of the signer needs to be protected, or where the public verifiability of the signature is avoided and only the designated recipient can verify the validity of the signature. To address the problem that the overall overhead of the traditional attribute-based strong designated verifier signature scheme is relatively large, an efficient attribute-based strong designated verifier signature scheme based on elliptic curve cryptography is proposed, as well as a security analysis of the new scheme given in the standard model under the difficulty of the elliptic curve discrete logarithm problem (ECDLP).

View Article and Find Full Text PDF

Background: Intensive care unit (ICU) organization is a critical factor in optimizing patient outcomes. ICU organization can be divided into "OPEN" (O) and "CLOSED" (C) models, where the specialist or intensivist, respectively, assumes the role of primary physician. Recent studies support improved outcomes in closed ICUs, however, most of the available data is centered on ICUs generally or on subspecialty surgical patients in the setting of a subspecialized surgical intensive care unit (SICU).

View Article and Find Full Text PDF

An enhanced pairing-free certificateless directed signature scheme.

PLoS One

February 2022

School of Control Science and Engineering, Shandong University, Jinan, Shandong, China.

Directed signature is a special cryptographic technique in which only the verifier designated by the signer can verify the validity of the signature. Directed signature can effectively protect the privacy of the signer's identity, so it is very suitable for medical records, taxation, and other fields. To improve the security and performance of the directed signature scheme, Gayathri et al.

View Article and Find Full Text PDF

Wireless body area networks (WBANs) are expected to play a vital role in the field of patient-health monitoring shortly. They provide a convenient way to collect patient data, but they also bring serious problems which are mainly reflected in the safe storage of the collected data. The privacy and security of data storage in WBAN devices cannot meet the needs of WBAN users.

View Article and Find Full Text PDF

We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism, named packet level authentication (PLA), can be an essential tool for addressing Denial of Service (DoS) attacks. Based on designated verifier signature schemes, our proposal is an appropriate and unprecedented solution applying digital signatures for DoS prevention.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!