scispace - formally typeset
Proceedings ArticleDOI

An Improved Security TCP Handshake Protocol with Authentication

Hanwei Wu, +1 more
- pp 1-4
Reads0
Chats0
TLDR
An improvement by using the alternative items of TCP packets, on this basis of which a security protocol is designed with authentication, which is compatible with the original protocol, adding authentication against various attacks.
Abstract
TCP three-way handshake protocol has a variety of security risks for the absence of safety certification, not enabling to make immense modification in it if maintained compatibility with the protocol.In this paper, we present an improvement by using the alternative items of TCP packets, on this basis of which a security protocol is designed with authentication. The new protocol is compatible wth the original protocol, adding authentication against various attacks. The formal analysis proves that the security protocol is in accordance with established safety goals.

read more

Citations
More filters
Journal ArticleDOI

Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T–S Fuzzy Networked Control System Under DoS Attacks

TL;DR: In this article , an improved Lyapunov-Krasovskii functions (LKFs) based on fuzzy membership functions are constructed, which combine the characteristics of nonlinear problems in the system to reduce the initial constraints.
Journal ArticleDOI

Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T–S Fuzzy Networked Control System Under DoS Attacks

TL;DR: In this paper , an improved Lyapunov-Krasovskii functions (LKFs) based on fuzzy membership functions are constructed, which combine the characteristics of nonlinear problems in the system to reduce the initial constraints.

Event-Triggered Control Strategy for 2-DoF Helicopter System Under DoS Attacks

TL;DR: In this article , an event-triggered strategy design of a two-degree-of-freedom (DoF) helicopter system (HS) with denial of service (DoS) attacks is presented.
Proceedings ArticleDOI

Event-triggered Control Strategy for 2-DoF Helicopter System under DoS Attacks

TL;DR: In this paper , an event-triggered strategy design of a two-degree-of-freedom (DoF) helicopter system (HS) with denial of service (DoS) attacks is presented.
Proceedings ArticleDOI

A DHCP Based Approach To IP Address Management And Allocation In A Network Using VLSM

TL;DR: In this article , the authors have implemented Dynamic Host Configuration Protocol (DHCP) and Variable Length Subnet Masking (VLSM) for optimizing Internet Protocol address allocation in a network.
References
More filters

Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR

TL;DR: This paper uses FDR, a refinement checker for CSP to discover an attack upon the Needham-Schroeder Public-Key Protocol, which allows an intruder to impersonate another agent, and adapt the protocol, and uses FDR to show that the new protocol is secure, at least for a small system.
Book ChapterDOI

Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR

TL;DR: In this article, the authors analyse the Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP, and discover an attack upon the protocol, which allows an intruder to impersonate another agent.
Proceedings ArticleDOI

Some new attacks upon security protocols

TL;DR: A number of new attacks upon security protocols are presented, and ways in which they may be designed to avoid designing incorrect protocols in the future are discussed.
Journal ArticleDOI

A survey of algebraic properties used in cryptographic protocols

TL;DR: This work gives a list of some relevant algebraic properties of cryptographic operators and provides examples of protocols or attacks using these properties, and gives an overview of the existing methods in formal approaches for analyzing cryptographic protocols.
Book ChapterDOI

Improving the functionality of syn cookies

TL;DR: An improvement of the SYN cookie protocol is presented, using all the current mechanisms for generating and validating cookies while allowing connections negotiated with SYN cookies to set up and use any TCP options.
Related Papers (5)