Proceedings ArticleDOI
An Improved Security TCP Handshake Protocol with Authentication
Hanwei Wu,Liping Guo +1 more
- pp 1-4
Reads0
Chats0
TLDR
An improvement by using the alternative items of TCP packets, on this basis of which a security protocol is designed with authentication, which is compatible with the original protocol, adding authentication against various attacks.Abstract:
TCP three-way handshake protocol has a variety of security risks for the absence of safety certification, not enabling to make immense modification in it if maintained compatibility with the protocol.In this paper, we present an improvement by using the alternative items of TCP packets, on this basis of which a security protocol is designed with authentication. The new protocol is compatible wth the original protocol, adding authentication against various attacks. The formal analysis proves that the security protocol is in accordance with established safety goals.read more
Citations
More filters
Journal ArticleDOI
Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T–S Fuzzy Networked Control System Under DoS Attacks
TL;DR: In this article , an improved Lyapunov-Krasovskii functions (LKFs) based on fuzzy membership functions are constructed, which combine the characteristics of nonlinear problems in the system to reduce the initial constraints.
Journal ArticleDOI
Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T–S Fuzzy Networked Control System Under DoS Attacks
TL;DR: In this paper , an improved Lyapunov-Krasovskii functions (LKFs) based on fuzzy membership functions are constructed, which combine the characteristics of nonlinear problems in the system to reduce the initial constraints.
Event-Triggered Control Strategy for 2-DoF Helicopter System Under DoS Attacks
TL;DR: In this article , an event-triggered strategy design of a two-degree-of-freedom (DoF) helicopter system (HS) with denial of service (DoS) attacks is presented.
Proceedings ArticleDOI
Event-triggered Control Strategy for 2-DoF Helicopter System under DoS Attacks
TL;DR: In this paper , an event-triggered strategy design of a two-degree-of-freedom (DoF) helicopter system (HS) with denial of service (DoS) attacks is presented.
Proceedings ArticleDOI
A DHCP Based Approach To IP Address Management And Allocation In A Network Using VLSM
Shanmuga Priya P R,D. Balaji +1 more
TL;DR: In this article , the authors have implemented Dynamic Host Configuration Protocol (DHCP) and Variable Length Subnet Masking (VLSM) for optimizing Internet Protocol address allocation in a network.
References
More filters
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
TL;DR: This paper uses FDR, a refinement checker for CSP to discover an attack upon the Needham-Schroeder Public-Key Protocol, which allows an intruder to impersonate another agent, and adapt the protocol, and uses FDR to show that the new protocol is secure, at least for a small system.
Book ChapterDOI
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TL;DR: In this article, the authors analyse the Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP, and discover an attack upon the protocol, which allows an intruder to impersonate another agent.
Proceedings ArticleDOI
Some new attacks upon security protocols
TL;DR: A number of new attacks upon security protocols are presented, and ways in which they may be designed to avoid designing incorrect protocols in the future are discussed.
Journal ArticleDOI
A survey of algebraic properties used in cryptographic protocols
TL;DR: This work gives a list of some relevant algebraic properties of cryptographic operators and provides examples of protocols or attacks using these properties, and gives an overview of the existing methods in formal approaches for analyzing cryptographic protocols.
Book ChapterDOI
Improving the functionality of syn cookies
TL;DR: An improvement of the SYN cookie protocol is presented, using all the current mechanisms for generating and validating cookies while allowing connections negotiated with SYN cookies to set up and use any TCP options.
Related Papers (5)
Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication
Sufatrio,Kook Yan Lam +1 more