scispace - formally typeset
Search or ask a question
Topic

Handshake

About: Handshake is a research topic. Over the lifetime, 1105 publications have been published within this topic receiving 15166 citations. The topic is also known as: šŸ¤.


Papers
More filters
Journal Articleā€¢DOIā€¢
TL;DR: This paper presents a two-level machine learning pipeline ( IoT Sense) for IoT device recognition, using (1) SVM and Decision Tree to model the spatial behaviors and (2) RNN tomodel the device-to-device temporal actions.

2Ā citations

Book Chapterā€¢DOIā€¢
01 Jan 2022
TL;DR: In this article , the authors proposed a variant of KEMTLS tailored to the IoT and embedded settings, which leverages the fact that clients know the server public keys in advance to decrease handshake latency while protecting client identities.
Abstract: The recent KEMTLS protocol (Schwabe, Stebila and Wiggers, CCSā€™20) is a promising design for a quantum-safe TLS handshake protocol. Focused on the web setting, wherein clients learn server public-key certificates only during connection establishment, a drawback of KEMTLS compared to TLS 1.3 is that it introduces an additional round trip before the server can send data, and an extra one for the client as well in the case of mutual authentication. In many scenarios, including IoT and embedded settings, client devices may however have the targeted server certificate pre-loaded, so that such performance penalty seems unnecessarily restrictive. This work proposes a variant of KEMTLS tailored to such scenarios. Our protocol leverages the fact that clients know the server public keys in advance to decrease handshake latency while protecting client identities. It combines medium-lived with long-term server public keys to enable a delayed form of forward secrecy even from the first data flow on, and full forward secrecy upon the first round trip. The new protocol is proved to achieve strong security guarantees, based on the security of the underlying building blocks, in a new model for multi-stage key exchange with medium-lived keys.

2Ā citations

Proceedings Articleā€¢DOIā€¢
09 Jul 2010
TL;DR: An improved mechanism is proposed, without exposing the PTK in the wireless space directly, this new mechanism performs great to avoid the DOS attack and to decrease the transmission load.
Abstract: With the development of WLAN (wireless local area network), the security problems become more apparent than before. 802.11i protocol enhances the security performance such as encryption and authentication, however, the four-way handshake procedure aiming to produce the PTK (pairwise transient key) is subjected to the DoS attack and the DoS flooding attack, which may result in memory exhaustion. Cookie mechanism is reviewed for its robustness against the DoS attack and the DoS flooding attack. After analyzing the Cookie mechanism, some weaknesses such as the exposure of the PTK are found. Thus, an improved mechanism is proposed, without exposing the PTK in the wireless space directly, this new mechanism performs great to avoid the DOS attack and to decrease the transmission load.

2Ā citations

Patentā€¢
03 Aug 2016
TL;DR: In this paper, the authors proposed a protection method for a communication module and an air conditioner, which consists of sending handshake formation once every first preset duration to the main control panel.
Abstract: The invention provides a protection method for a communication module and an air conditioner. The communication module is arranged in the air conditioner. The air conditioner is further provided with a main control panel. The protection method for the communication module comprises the steps that the communication module sends handshake formation once every first preset duration to the main control panel; the main control panel determines whether the handshake formation sent by the communication module is received and judges whether the handshake formation is normal when determining that the handshake formation is received; and if the main control panel does not receive the handshake formation in the preset time or the handshake formation is judged to be abnormal when received, alarm reminding is conducted. According to the technical scheme of the protection method for the communication module and the air conditioner, a communication problem existing between the communication module and the main control panel of the air conditioner can be detected effectively so that corresponding protection measures can be taken in time, and the problems that a lawbreaker damages the communication module maliciously and attempts to bypass the management mechanism of the air conditioner are solved.

2Ā citations

Patentā€¢
16 Dec 1983
TL;DR: In this paper, the authors proposed a protocol for small computer systems which are hand portable or briefcase portable and which operate with small peripherals, where the transmitting device places an active signal on a handshake line for a predetermined period of time.
Abstract: A communications system employs a multiline bus including control lines for multiple functions in order to minimize the required number of bus lines. This technique is most applicable to small computer systems which are hand portable or briefcase portable and which operate with small peripherals. The transmitting device places an active signal on a handshake line for a predetermined period of time. The receiving device detects this active signal and also places an active signal on the handshake line. The transmitting device applies valid data to the data lines throughout the period that a active signal is on the handshake line. Upon detection of the data the receiver releases the handshake line. Using this technique a single line is used to indicate valid data transmission and proper reception. An additional bus available line, used by a master device to alert slave devices that communications is in process, can be employed by at least some of the slave devices to request service from the master device.

2Ā citations


Network Information
Related Topics (5)
The Internet
213.2KĀ papers, 3.8MĀ citations
79% related
Social network
42.9KĀ papers, 1.5MĀ citations
74% related
Wireless
133.4KĀ papers, 1.9MĀ citations
74% related
Encryption
98.3KĀ papers, 1.4MĀ citations
73% related
Wireless network
122.5KĀ papers, 2.1MĀ citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202358
2022140
202137
202065
201991
201877