Title :
FPAC: fast, fixed-cost authentication for access to reserved resources
Author :
Calvert, Kenneth L. ; Venkatraman, Srinivasan ; Griffioen, James N.
Author_Institution :
Lab. for Adv. Networking, Kentucky Univ., Lexington, KY, USA
Abstract :
Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services are vulnerable to denial-of-service attacks if packet classification is based on information that can be forged, such as source and destination addresses and port numbers. Traditional message authentication codes (MACs), often considered the only solution to this problem, are really not designed to solve it. In particular, their per-packet costs are so high that they enable another form of denial-of-service attack based on overwhelming the verification mechanism. We describe the problem of denial of access to reserved resources and the inadequacies of conventional solutions. We then observe that it is reasonable to trade some of the strong security guarantees provided by conventional MACs for a lower per-packet cost. We propose a new packet authentication algorithm, designed to solve the problem of protecting reserved resources, with a very low, fixed per-packet cost. While it cannot replace conventional MACs for end-to-end authentication, we argue that it is a better solution for the problem considered here. We present measurements from a prototype implementation that can verify a packet of arbitrary size in as few as 1000 machine cycles on an Intel architecture machine.
Keywords :
bandwidth allocation; buffer storage; message authentication; packet switching; telecommunication network routing; telecommunication security; FPAC; MACs; bandwidth; buffer space; denial-of-service attacks; enhanced network services; fast fixed-cost authentication; message authentication codes; packet authentication algorithm; packet classification; reserved resources; security; traffic; verification mechanism; Algorithm design and analysis; Bandwidth; Computer crime; Costs; Message authentication; Protection; Resource management; Security; Size measurement; Telecommunication traffic;
Conference_Titel :
INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE
Print_ISBN :
0-7803-7476-2
DOI :
10.1109/INFCOM.2002.1019353