2018
DOI: 10.3390/s18092813
|View full text |Cite
|
Sign up to set email alerts
|

New DoS Defense Method Based on Strong Designated Verifier Signatures

Abstract: We present a novel technique for source authentication of a packet stream in a network, which intends to give guarantees that a specific network flow really comes from a claimed origin. This mechanism, named packet level authentication (PLA), can be an essential tool for addressing Denial of Service (DoS) attacks. Based on designated verifier signature schemes, our proposal is an appropriate and unprecedented solution applying digital signatures for DoS prevention. Our scheme does not rely on an expensive publ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 66 publications
(90 reference statements)
0
7
0
Order By: Relevance
“…Even though secure data communication is not a focus of this paper, it is essential to highlight that a distributed system such as this proposed healthcare application needs a fully distributed security system, such as proposed in Ferreira and de Sousa Jr. ( 2017 ). As it also comprises interactions according to the Internet of Things (IoT) paradigm and involves personal data, a particularly lightweight protocol for the authentication of devices, as proposed in de Almeida et al ( 2018 ), is also paramount.…”
Section: Proposed Healthcare Platform Composed Of Low-cost Hardware High-resolution Parameter Estimation Algorithms and Real-time Monitormentioning
confidence: 99%
“…Even though secure data communication is not a focus of this paper, it is essential to highlight that a distributed system such as this proposed healthcare application needs a fully distributed security system, such as proposed in Ferreira and de Sousa Jr. ( 2017 ). As it also comprises interactions according to the Internet of Things (IoT) paradigm and involves personal data, a particularly lightweight protocol for the authentication of devices, as proposed in de Almeida et al ( 2018 ), is also paramount.…”
Section: Proposed Healthcare Platform Composed Of Low-cost Hardware High-resolution Parameter Estimation Algorithms and Real-time Monitormentioning
confidence: 99%
“…DoS attack is quite common in IoT based network, where an unauthorized user sends thousands of requests to the authentication server to shut down the operation temporarily. To contrast, de Almeida et al [48] developed a method to defense Dos attack in a network by providing packet-level authentication. In addition, a distributed denial of service attack is an advanced DoS attack where DoS is performed in a distributed manner.…”
Section: Dos Attackmentioning
confidence: 99%
“…The total signal energy (TSE), named T, refers to the sum of the amplitude frequency of all elements in the time-frequency joint distribution matrix as Formula (5). In Figure 4, the total signal energy values of 150 detection windows acquired in normal state and LDoS attack state respectively are compared.…”
Section: Total Signal Energymentioning
confidence: 99%
“…Due to the constant preemption of resources by the LDoS attack stream, the service quality of TCP connection in the network is affected. Therefore, the average value of TCP is lower, and the value of TSE is also reduced according to Formulas (4) and (5).…”
Section: Total Signal Energymentioning
confidence: 99%
See 1 more Smart Citation