咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >E2E KEEP: End to End Key Excha... 收藏

E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks

E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks

作     者:Hossein Fereidooni Hassan Taheri Mehran Mahramian 

作者机构:Electrical Engineering Department Amirkabir University of Technology Tehran Iran Informatics Services Corporation Tehran Iran 

出 版 物:《International Journal of Communications, Network and System Sciences》 (通讯、网络与系统学国际期刊(英文))

年 卷 期:2012年第5卷第4期

页      面:228-237页

学科分类:081203[工学-计算机应用技术] 08[工学] 0835[工学-软件工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Virtual Private Networks (VPNs) Public Key Infrastructure Authentication Internet Key Exchange (IKE) BAN-Logic 

摘      要:Accelerating methods are used to enhance TCP performance over satellite links by employing Performance Enhancement Proxies (PEPs). However, providing a secure connection through the PEPs seems to be impossible. In this paper an appropriate method is proposed in order to provide an accelerated secure E2E connection. We show an efficient secure three-party protocol, based on public key infrastructure (PKI), which provides security against spiteful adversaries. Our construction is based on applying asymmetric cryptography techniques to the original IKE protocol. Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified in detail, we cannot be certain what constitute a flaw. Proofing security properties is essential for the development of secure protocol. We give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. Based on the results of this preliminary analysis, we have implemented a prototype of our security protocol and evaluated its performance and checked safety properties of security protocol, and the results show that the protocol is robust and safe against major security threats.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分