T-IP: A Self-Trustworthy and Secure Internet Protocol  

T-IP: A Self-Trustworthy and Secure Internet Protocol

在线阅读下载全文

作  者:Xiaofeng Wang Huan Zhou Jinshu Su Baosheng Wang Qianqian Xing Pengkun Li 

机构地区:[1]School of Computer, National University of Defense Technology

出  处:《China Communications》2018年第2期1-14,共14页中国通信(英文版)

基  金:supported by the national key research and development program under grant 2017YFB0802301;Guangxi cloud computing and large data Collaborative Innovation Center Project

摘  要:IPsec has become an important supplement of IP to provide security protection. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol(T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages:(1) Self-Trustworthy IP address.(2) Low connection latency and transmission overhead.(3) Reserving the important merit of IP to be stateless.(4) Compatible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our security-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and Do S attack. The evaluation shows that T-IP has a much lower transmission overhead and connection latency compared with IPsec.IPsec has become an important supplement of IP to provide security protec- tion. However, the heavyweight IPsec has a high transmission overhead and latency, and it cannot provide the address accountability. We propose the self-trustworthy and secure Internet protocol (T-IP) for authenticated and encrypted network layer communications. T-IP has the following advantages: (1) Self-Trust- worthy IP address. (2) Low connection latency and transmission overhead. (3) Reserving the important merit of IP to be stateless. (4) Com- patible with the existing TCP/IP architecture. We theoretically prove the security of our shared secret key in T-IP and the resistance to the known session key attack of our secu- rity-enhanced shared secret key calculation. Moreover, we analyse the possibility of the application of T-IP, including its resilience against the man-in-the-middle attack and DoS attack. The evaluation shows that T-IP has a much lower transmission overhead and con- nection latency compared with IPsec.

关 键 词:identity-based cryptography self-trustworthy LIGHTWEIGHT low latency in-cremental deployment 

分 类 号:TP393.04[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象