scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.


Papers
More filters
Proceedings ArticleDOI
10 Oct 2010
TL;DR: This paper studies the feasibility of mobile vehicle access for a hybrid environment that contains sparse and dense access point deployments and shows that IEEE 802.11g is still weak in supporting mobile vehicle Access to the Wireless LAN and expects that IEEE802.11p, designed specifically for vehicle networks, can provide better mobile services.
Abstract: Wireless network access from moving vehicles can be challenged by many factors such as connection opportunities, mobility, handshake phase, and data sizes, etc. The handshake time and transmission rate can be influenced differently in vehicle-to-roadside networks than a static wireless LAN access. The radio signal strength changes and Doppler shift occur when the vehicle is moving. Switching among APs could cause significant connection stale, which could have a major impact on the handshake phase and transmission rate. The purpose of our paper is to enhance the understanding of these influential factors and study the feasibility of mobile vehicle access for a hybrid environment that contains sparse and dense access point deployments. Experiment data was collected in a moving vehicle, which traveled around the campus of the university. In the data analyze part, the above factors are analyzed for packet inter-arrival time, response time and transmission rate; Our main results are focused in security enabled protocols such as HTTPS and SSH, as well as TCP file transmission. Our data shows that IEEE 802.11g is still weak in supporting mobile vehicle access to the Wireless LAN. We expect that IEEE 802.11p, designed specifically for vehicle networks, can provide better mobile services.

4 citations

Proceedings ArticleDOI
10 Jun 2019
TL;DR: A scheme for securing MP-TCP is proposed with the assistance of SDN, in which a new security module residing in the SDN controller acts as a third-party session-key distribution authority and a lightweight information-hiding mechanism to secure the keys exchanged during the initial handshake is proposed.
Abstract: Multipath TCP (MP-TCP) has been introduced as an extension to legacy TCP to support simultaneous communication through multiple paths. Although MP-TCP has many advantages over TCP, some issues and challenges related to security robustness of this protocol remain unaddressed. The root cause of many threats specific to MP-TCP stem from the fact that user-specific credentials such as shared keys exchanged in the initial handshake are exposed. This allows an attacker to hijack an ongoing session by exploiting the authentication values of users. On the other hand, Software Defined Networking (SDN) has received much attention recently due to its many advantages, such as programmability and centralization. In this paper, a scheme for securing MP-TCP is proposed. This is achieved with the assistance of SDN, in which a new security module residing in the SDN controller acts as a third-party session-key distribution authority. After the retrieval of session keys, a lightweight information-hiding mechanism to secure the keys exchanged during the initial handshake is proposed.

4 citations

Proceedings ArticleDOI
07 Jun 2020
TL;DR: This work builds on the well-known lattice-based DLP-IBE scheme to construct an ID-based certificateless authenticated key exchange for post-quantum Transport Layer Security (TLS) handshakes, and shows that the ID- based handshake is 3.7 times more energy-efficient than the traditional certificate-based handshake.
Abstract: Identity-Based Encryption (IBE) is considered an alternative to traditional certificate-based public key cryptography to reduce communication overheads in wireless sensor networks. In this work, we build on the well-known lattice-based DLP-IBE scheme to construct an ID-based certificateless authenticated key exchange for post-quantum Transport Layer Security (TLS) handshakes. We also propose concrete parameters for the underlying lattice computations and provide detailed implementation results. Finally, we compare the combined computation and communication cost of our ID-based certificate-less handshake with the traditional certificate-based handshake, both using lattice-based algorithms at similar postquantum security levels, and show that our ID-based handshake is 3.7× more energy-efficient, thus highlighting the advantage of ID-based key exchange for post-quantum TLS.

4 citations

01 Jan 1999
TL;DR: This work presents a new protocol for reliable delivery of messages over a network that might lose, duplicate, reorder, or arbitrarily delay packets, and is the first protocol that guarantees exactly-once and ordered delivery on a connection while avoiding precursory handshakes.
Abstract: We present a new protocol for reliable delivery of messages over a network that might lose, duplicate, reorder, or arbitrarily delay packets It is the first protocol that guarantees exactly-once and ordered delivery on a connection while avoiding precursory handshakes Avoiding handshakes reduces the overhead for sending small, intermittent messages as in remote procedure calls and protocols like HTTP Like other practical protocols, it permits discarding information for idle connections The protocol works by combining existing handshakebased and time-based protocols It uses loosely synchronized clocks to avoid handshakes A handshake is executed only upon an unexpectedly long packet delay or clock skew Thus, unexpected conditions degrade performance but do not compromise reliability The resultant protocol has the reliability of handshake-based protocols and the efficiency of time-based protocols

4 citations

Patent
30 Mar 2011
TL;DR: In this paper, a detection mechanism ensures that certain layers within the storage I/O stack are present and cooperate with a particular protocol, such as a data encryption key (DEK) management protocol.
Abstract: A system shares encryption-related metadata between layers of a storage I/O stack. Additionally, a detection mechanism ensures that certain layers within the storage I/O stack are present and cooperate with a particular protocol. Along these lines, functional components engage in an in-band communications protocol, such as a data encryption key (DEK) management protocol. The in-band communications protocol employs protocol commands and responses carried along the data path as contents of in-band transport messages and responses, such as special SCSI read commands and their responses. The protocol commands and responses include a handshake command and a handshake response used during an initial handshake operation. Each protocol command and response has a protocol signature field carrying one of distinct first and second signature values which are used to identify the presence of the protocol command or response in the transport messages and responses at different locations along the data path.

4 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
79% related
Social network
42.9K papers, 1.5M citations
74% related
Wireless
133.4K papers, 1.9M citations
74% related
Encryption
98.3K papers, 1.4M citations
73% related
Wireless network
122.5K papers, 2.1M citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877