Topic
Handshake
About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: 🤝.
Papers published on a yearly basis
Papers
More filters
••
10 Oct 2010TL;DR: This paper studies the feasibility of mobile vehicle access for a hybrid environment that contains sparse and dense access point deployments and shows that IEEE 802.11g is still weak in supporting mobile vehicle Access to the Wireless LAN and expects that IEEE802.11p, designed specifically for vehicle networks, can provide better mobile services.
Abstract: Wireless network access from moving vehicles can be challenged by many factors such as connection opportunities, mobility, handshake phase, and data sizes, etc. The handshake time and transmission rate can be influenced differently in vehicle-to-roadside networks than a static wireless LAN access. The radio signal strength changes and Doppler shift occur when the vehicle is moving. Switching among APs could cause significant connection stale, which could have a major impact on the handshake phase and transmission rate. The purpose of our paper is to enhance the understanding of these influential factors and study the feasibility of mobile vehicle access for a hybrid environment that contains sparse and dense access point deployments. Experiment data was collected in a moving vehicle, which traveled around the campus of the university. In the data analyze part, the above factors are analyzed for packet inter-arrival time, response time and transmission rate; Our main results are focused in security enabled protocols such as HTTPS and SSH, as well as TCP file transmission. Our data shows that IEEE 802.11g is still weak in supporting mobile vehicle access to the Wireless LAN. We expect that IEEE 802.11p, designed specifically for vehicle networks, can provide better mobile services.
4 citations
••
10 Jun 2019TL;DR: A scheme for securing MP-TCP is proposed with the assistance of SDN, in which a new security module residing in the SDN controller acts as a third-party session-key distribution authority and a lightweight information-hiding mechanism to secure the keys exchanged during the initial handshake is proposed.
Abstract: Multipath TCP (MP-TCP) has been introduced as an extension to legacy TCP to support simultaneous communication through multiple paths. Although MP-TCP has many advantages over TCP, some issues and challenges related to security robustness of this protocol remain unaddressed. The root cause of many threats specific to MP-TCP stem from the fact that user-specific credentials such as shared keys exchanged in the initial handshake are exposed. This allows an attacker to hijack an ongoing session by exploiting the authentication values of users. On the other hand, Software Defined Networking (SDN) has received much attention recently due to its many advantages, such as programmability and centralization. In this paper, a scheme for securing MP-TCP is proposed. This is achieved with the assistance of SDN, in which a new security module residing in the SDN controller acts as a third-party session-key distribution authority. After the retrieval of session keys, a lightweight information-hiding mechanism to secure the keys exchanged during the initial handshake is proposed.
4 citations
••
07 Jun 2020TL;DR: This work builds on the well-known lattice-based DLP-IBE scheme to construct an ID-based certificateless authenticated key exchange for post-quantum Transport Layer Security (TLS) handshakes, and shows that the ID- based handshake is 3.7 times more energy-efficient than the traditional certificate-based handshake.
Abstract: Identity-Based Encryption (IBE) is considered an alternative to traditional certificate-based public key cryptography to reduce communication overheads in wireless sensor networks. In this work, we build on the well-known lattice-based DLP-IBE scheme to construct an ID-based certificateless authenticated key exchange for post-quantum Transport Layer Security (TLS) handshakes. We also propose concrete parameters for the underlying lattice computations and provide detailed implementation results. Finally, we compare the combined computation and communication cost of our ID-based certificate-less handshake with the traditional certificate-based handshake, both using lattice-based algorithms at similar postquantum security levels, and show that our ID-based handshake is 3.7× more energy-efficient, thus highlighting the advantage of ID-based key exchange for post-quantum TLS.
4 citations
01 Jan 1999
TL;DR: This work presents a new protocol for reliable delivery of messages over a network that might lose, duplicate, reorder, or arbitrarily delay packets, and is the first protocol that guarantees exactly-once and ordered delivery on a connection while avoiding precursory handshakes.
Abstract: We present a new protocol for reliable delivery of messages over a network that might lose, duplicate, reorder, or arbitrarily delay packets It is the first protocol that guarantees exactly-once and ordered delivery on a connection while avoiding precursory handshakes Avoiding handshakes reduces the overhead for sending small, intermittent messages as in remote procedure calls and protocols like HTTP Like other practical protocols, it permits discarding information for idle connections The protocol works by combining existing handshakebased and time-based protocols It uses loosely synchronized clocks to avoid handshakes A handshake is executed only upon an unexpectedly long packet delay or clock skew Thus, unexpected conditions degrade performance but do not compromise reliability The resultant protocol has the reliability of handshake-based protocols and the efficiency of time-based protocols
4 citations
•
30 Mar 2011TL;DR: In this paper, a detection mechanism ensures that certain layers within the storage I/O stack are present and cooperate with a particular protocol, such as a data encryption key (DEK) management protocol.
Abstract: A system shares encryption-related metadata between layers of a storage I/O stack. Additionally, a detection mechanism ensures that certain layers within the storage I/O stack are present and cooperate with a particular protocol. Along these lines, functional components engage in an in-band communications protocol, such as a data encryption key (DEK) management protocol. The in-band communications protocol employs protocol commands and responses carried along the data path as contents of in-band transport messages and responses, such as special SCSI read commands and their responses. The protocol commands and responses include a handshake command and a handshake response used during an initial handshake operation. Each protocol command and response has a protocol signature field carrying one of distinct first and second signature values which are used to identify the presence of the protocol command or response in the transport messages and responses at different locations along the data path.
4 citations