Full Paper View Go Back

Denial of Services Based Countermeasures Key Exchange Protocols

A. Agrawal1 , J. Soni2

Section:Research Paper, Product Type: Isroset-Journal
Vol.1 , Issue.2 , pp.38-44, Mar-2013


Online published on Apr 30, 2013


Copyright © A. Agrawal, J. Soni . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Agrawal, J. Soni, “Denial of Services Based Countermeasures Key Exchange Protocols,” International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.2, pp.38-44, 2013.

MLA Style Citation: A. Agrawal, J. Soni "Denial of Services Based Countermeasures Key Exchange Protocols." International Journal of Scientific Research in Computer Science and Engineering 1.2 (2013): 38-44.

APA Style Citation: A. Agrawal, J. Soni, (2013). Denial of Services Based Countermeasures Key Exchange Protocols. International Journal of Scientific Research in Computer Science and Engineering, 1(2), 38-44.

BibTex Style Citation:
@article{Agrawal_2013,
author = {A. Agrawal, J. Soni},
title = {Denial of Services Based Countermeasures Key Exchange Protocols},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {3 2013},
volume = {1},
Issue = {2},
month = {3},
year = {2013},
issn = {2347-2693},
pages = {38-44},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=186},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=186
TI - Denial of Services Based Countermeasures Key Exchange Protocols
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - A. Agrawal, J. Soni
PY - 2013
DA - 2013/04/30
PB - IJCSE, Indore, INDIA
SP - 38-44
IS - 2
VL - 1
SN - 2347-2693
ER -

4262 Views    4279 Downloads    4160 Downloads
  
  

Abstract :
Cryptography has become indispensable in areas such as e-commerce, the legal safeguarding of medical records, and secures electronic communication. Cryptographic protocols like key exchange usually require expensive computations such as finite field exponentiations or elliptic curve scalar-point multiplications. In an adversarial environment such as the Internet, an attacker could effect a denial of service attack against a server by forcing the server to perform many instances of a cryptographic protocol. To help tackle this challenge, several cryptographic primitives and constructions have been proposed, including mechanisms to securely distribute data over a unidirectional insecure channel, schemes in which leakage of cryptographic keys can be traced back to the leaker, and techniques to combine revocation and tracing capabilities. In this paper we proposed the integration of denial of service countermeasures key exchange protocol by introducing a formal model for denial of service resilience that complements model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client queries and puzzles.

Key-Words / Index Term :
Cryptography, DoS, Secure Key Exchange Protocol and Digital Signature

References :
[1] N H Ayachit, Santosh L Deshpande, and Kamakshi Prasad V, “Evolutionary Computing based secure key management Protocol”, IEEE 2010.
[2] Abdelouahid Derhab and Nadjib Badache. A Self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks. IEEE Transactions on Parallel Distributed Systems, 19(7), pp- 926–939, 2008.
[3] Lin Yao, Bing Liu, Kai Yao, Guowei Wu, and Jia Wang, “An ECG-Based Signal Key Establishment Protocol in Body Area Network”, IEEE 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 233-238.
[4] H. Wen, P.-H. Ho, C. Qi, and G. Gong, “Physical layer assisted authentication for distributed ad hoc wireless sensor networks”, IEEE 2010, Special Issue on Multi-Agent & Distributed Information Security, pp. 390-396.
[5] CAO Zheng, YIN Pengpeng, and LU Zhengjun, “A Key Management Scheme for Multicast Based on Layer 2 Control”, IEEE 2010, International Conference on Computer and Information Technology (CIT 2010), pp. 1512-1518.
[6] Jinxia Yu, Yongli Tang, Xiancha Chen and Wenjing Liu, “Choice Mechanism of Proposal Distribution in Particle Filter”, IEEE 2010, Proceedings of the 8th World Congress on Intelligent Control and Automation, pp. 1051-1056.
[7] Jinxia Yu, Yongli Tang, Xiancha Chen and Wenjing Liu, “Choice Mechanism of Proposal Distribution in Particle Filter”, IEEE 2010, Proceedings of the 8th World Congress on Intelligent Control and Automation, pp. 1051-1056.
[8] FengHe and Kuan Hao, Hao Ma, “S-MAODV:A Trust Key Computing Based Secure Multicast Ad-hoc On Demand Vector Routing Protocol”, IEEE 2010, pp. 434-438.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation