2012 IEEE Global Communications Conference (GLOBECOM) 2012
DOI: 10.1109/glocom.2012.6503222
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical two-tier one-way hash chain protocol for secure internet transactions

Abstract: One-way hash chains are a popular cryptographic technique used in many security applications. In this paper, we present a two-tier one-way hash chain (TTOHC) protocol to secure cookie-based Internet transactions. The use of cookies as a cheaper alternative to secure Internet sessions is extremely dangerous since session cookies can be easily sniffed out resulting in session hijacking. By utilizing different cryptographic hash functions arranged in two tiers, our hierarchical TTOHC protocol gives significant pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…This new kind of hash chain can be self-renewing without addition protocols and re-initialization smoothly. Another approach, the Two-tier One-way Hash Chain [8], have gave significant performance improvement over previously proposal. This proposal has a single first-tier chain and multiple second-tier chains.…”
Section: Background and Related Workmentioning
confidence: 95%
See 1 more Smart Citation
“…This new kind of hash chain can be self-renewing without addition protocols and re-initialization smoothly. Another approach, the Two-tier One-way Hash Chain [8], have gave significant performance improvement over previously proposal. This proposal has a single first-tier chain and multiple second-tier chains.…”
Section: Background and Related Workmentioning
confidence: 95%
“…Our proposal is based on two-tier self-renewable hash chain introduced by Alabrah et al [8] and Zhang et al [6] which are not meant for SDN. In our proposal, two tiers of hash chain, as shown in Fig.1, are used for different purposes.…”
Section: A Data-origin Authentication Protocol Based On Onos Clustermentioning
confidence: 99%
“…This relieves some of the computational overhead, but requires additional memory that sometimes is not available especially with low-end devices such as some wireless devices. Another approach suggested in [17] and [18] is to divide the one-way hash chains in a twodimensional format. Compared to the sparse caching approach, dividing the OHC into multiple smaller chains does not provide a similar reduction in the computational overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Compared to the sparse caching approach, dividing the OHC into multiple smaller chains does not provide a similar reduction in the computational overhead. In this paper, we propose a solution that benefits from the advantages of the sparse caching strategy proposed in [15] and [16], in addition to the efficiency of the twodimensional one-way hash construction [17] and [18]. The hybrid approach is light, efficient and easy to implement as a client side plug-in.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation