Title :
Prevention of Man-in-the-Middle Attacks Using ID Based Signatures
Author :
Radhakishan, V. ; Selvakumar, S.
Author_Institution :
Dept. of Comput. Sci. & Eng., Nat. Inst. of Technol., Tiruchirappalli, India
Abstract :
The Denial-of-Service (DoS) attack is a serious threat to the legitimate use of the Internet. It is hard to detect and there is no comprehensive method to prevent such attacks. The primary goal of an attack is to deny the access to a particular resource of a victim. The attacker, in order to hide the identity, often spoofs the source IP address of the packet. Such spoofing results in the impossibility of tracing back the attacker. Recently, TrueIP, a IP spoofing prevention technique using Identity based cryptography has been proposed in which a signature scheme is used to achieve better security. In this paper, the drawbacks of TrueIP are addressed and a new architecture has been proposed to overcome them. In addition, all sorts of man-in-the-middle attacks (MIMA) are eliminated in our proposal.
Keywords :
cryptography; digital signatures; ID based signatures; IP spoofing prevention; Internet; TrueIP; denial-of-service attack; identity based cryptography; man-in-the-middle attacks; Computer crime; IP networks; Protocols; Public key; Servers; ID Based Signatures; IP Spoofing; Man-in-the-Middle attacks;
Conference_Titel :
Networking and Distributed Computing (ICNDC), 2011 Second International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4577-0407-9
DOI :
10.1109/ICNDC.2011.40