ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services

Size: px
Start display at page:

Download "ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services"

Transcription

1 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services DaeHee Seo 1), Gaeil An 2), JongHyun Kim 3), Jang-Mi Beak 4), Dong-sub Cho 5) Abstract This paper aims to analyze vulnerability of overlay networks for the existing P2P service and suggest a secure and efficient ESCORT network Encryption functions are used to provide encryption, explicit mutual authentication and session keys are provided to ensure secure communication, and a middle object is suggested to maintain efficiency Moreover, Time stamps are used for each communication process to provide effective network security service Thus, the proposed ESCORT network provides not only security for P2P users but also other advantages such as user privacy protection, secure communication and effective security management through centralized control Keywords : Ubiquitous Network, Overlay Network, P2P, Secure Communication, Network Management 1 Introduction Recent evolution of communication environment is a result of research on networks to provide various types of digital contents In particular, overlay networks have been mainly used in a distributed computing environment, providing effective service control and satisfying user requirements at application service level on physical delivery networks [3] [5] Previous researches on overlay networks focused on maximizing network usage, along with connectivity of virtual networks consisting of links of each node However, security related problems haven't been solved yet Received(October 04, 2011), Review request(october 05, 2011), Review Result(1st: October 18, 2011, 2nd: October 31, 2011) Accepted(December 31, 2011) 1 Electronics and Telecommunications Research Institute, Daejeon, Korea dhseo@etrirekr 2 Electronics and Telecommunications Research Institute, Daejeon, Korea fogone@etrirekr 3 Electronics and Telecommunications Research Institute, Daejeon, Korea jhk@etrirekr 4 (Corresponding Author) SoonChunHyang Univ, Department of Computer Software Engineering, ChoongNam, Korea bjm1453@schackr 5 Ewha Womans Univ, Department of Computer Science and Engineering, Seoul, Korea dscho@ewhaackr 673

2 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services That is why security of overlay network is suggested as one of the key challenges along with network efficiency [6] [15] Therefore, this paper is intended to suggest a new type of network to ensure security of overlay networks by analyzing the existing overlay networks Section 2 analyzes existing schemes based on security requirements; Section 3 proposed secure and efficient ESCORT (Encryption, Secure Communication, ORganization using Time-stamp); Section 4 analyzes the suggested scheme based on security requirements suggested; and finally Section 5 suggests summary and appropriate direction of future works 2 ANALYSIS OF EXISTING SCHEMES 21 The Distributed Schemes A scheme of distributed overlay network is based on cooperation among nodes without centralized servers and includes Chord scheme suggested by MIT and UCBerkeley in 2001 [9], Pastry scheme suggested by Germany in 2001 [1] and CAN(Content Addressable Network) scheme suggested by ACIRA(AT&T Center for Internet Research) [11] and Berkeley in 2001 [14] However, distributed overlay networks have the following vulnerabilities due to inconsistent security since data is managed by cooperation among nodes Whitewashing: It is difficult to verify actual data users in distributed overlay networks, which unauthorized users may attack network security and privacy of each element may not be protected Thus, static model must be used to solve this problem Sybil attack: Attackers can acquire legal node ID in distributed overlay network through Sybil attack, which causes security vulnerability during communication Protection of user privacy: Distributed overlay networks have security vulnerability of message fabrication/modulation or delivery of fake information In particular, when transmitted messages are based on users' information, user privacy is not protected MITM attack: Distributed overlay networks provide user authentication based on hash tables of other elements, but have vulnerability of establishing session keys for encrypted communication and confidentiality of authorized elements' all messages Storage and Retrieval attack: Distributed overlay networks cannot provide additional secure service against abnormal behaviors because they don't have explicit authentication process and reliable organizations Detection of participants' intended abnormal behaviors: Detecting basic abnormal behaviors must consider policies related to anti-virus and network security products, but the existing schemes do not support relevant policies 674

3 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 22 Mudhakar Scheme Mudhakar scheme suggested by Georgia Institute of Technology's Mudhakar Srivatsa(hereinafter referred to as Mudhakar scheme) is intended to maintain security of the overall network through mutual authentication and key creation by generating tokens of each event [12] However, the proposed scheme has the following vulnerabilities: Whitewashing: Mudhakar scheme suggests user's authentication and encrypted communication through ID-Key mapping, but attackers may use enclosed IDs As a result, this scheme is vulnerable to ID-Key mapping attacks and cannot maintain security Management efficiency: Growing KDC(Key Distribution Center) traffic increases management overhead and cost required to manage keys, ultimately causing inefficiency of the overall network Detection of participants' intended abnormal behaviors: The proposed scheme does not support policy for network security and it is hard to detect participants' intended abnormal behaviors Therefore, relevant policy must be supported to compensate this problem 23 Existing pub-sub scheme There are pub-sub schemes such as Mcastro scheme [8] [10] proposed, key based scheme [7] proposed in 2007 and GP jesi scheme[4] proposed in 2007 These are the schemes which were performed by collaborating between the nodes an integrity server However, existing pub-sub method has vulnerabilities as the following Publishers: Basic pub-sub overlay models are based on reliable publishers All publishers are reliably connected as authorized/authenticated elements However, each publisher may be composed of high performance publishers and low performance publishers That is why basic pub-sub models require different management depending on each publisher and separate authorization/authentication system Moreover, basic pub-sub models are vulnerable to attackers disguised as reliable elements scribers: In basic pub-sub models, subscribers are based on unauthorized subscribers participating in overlay networks Unauthorized subscribers are approved as authorized subscribers through secure authentication process If, however, unauthorized nodes attack unauthenticated subscribers participating in overlay networks, security cannot be maintained, requiring additional management 3 ESCORT NETWORK SCHEME The suggested scheme refers to pub-sub system based on the contents similar to the Siena [15] When an event occurs at the pub-sub system, a publisher will provide contents After an event is defined by current 675

4 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services group's name, form and specific value, the event will occur If a single event or various events occur at pub-sub overlay network structure, subscribers can perform their interesting event Common pub-sub system is consisted of as the following scribe: if an event occurs, a subscriber defines the event by using subscribe function Advertise: a publisher announces a form of event by using advertising Publish: a publisher announces publish function Unsubscribe: if there is unsubscribe request, the subscription is verified and cancelled Unadvertise: unadvertise is verified and the related contents are cancelled 31 System parameters The suggested scheme refers to pub-sub system based on the contents similar to the Siena [15] When an event occurs at the pub-sub system, a publisher will provide contents The architecture in the proposed scheme is based on pub-sub model Each of the components is defined as the following (Figure 1) Trust Contents Service (TCS) Application layer ESCORT Publisher ESCORT scriber ESCORT Middle Object ESCORT Policy ESCORT Router ESCORT Application object layer Overlay Network Security Layer Security layer Publisher Middle- Publisher scriber Middle- scriber Router Basic object layer Basic Pub- Network Basic network layer [Fig 1] ESCORT Architecture 1) Basic configuration hierarchy This paper presents the basic ESCORT entities referring to the existing pub-sub model The properties of the critical basic entities of ESCORT architecture are as the following Publishers: Publishers in ESCORT model are trusted entities They classify and perform an event with their performance Each publisher is securely connected They perform the role of authentication and managing middle publishers Middle-publisher: Middle entity is not proposed in the basic pub-sub overlay model Middle-publisher is suggested to secure publisher s safety and effective network management Middle-publishers authorize the 676

5 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 event requested by end user (ESCORT user) and notify it to the highest-publishers However, middle-publishers should perform mutual authorization with publishers through secure process because they are not trusted entities Publishers announce the security of middle-publishers as a form of public event so publishers should announce that they are temporary trusted entities in order to perform the role of middle-publisher during certain period of time scribers: scribers in the suggested model perform the intermediary role for secure authorization with subscribers unauthorized from middle-subscribers and middle-publisher The event transmitted to unauthorized subscribers is retransferred to authorized subscribers Middle-subscribers: Middle subscribers temporarily manage unauthorized subscribers prior to the authorization of the upper publishers They manage the subscribers wanting to participate in overlay network before secure authorization process of the upper publishers They provide the least security services in order to secure the safety against unauthorized nodes Router: Routing node searches optimal routing path for secure effective communication with the final entity Variable routing node is provided to maximize the efficiency and availability of network 2) ESCORT network security -class In the proposed architecture, the security-layer is suggested to secure the safety between each protocol layer, which provides the security services as the following ACI: The layer provides the security service related to ACI in order to secure the safety of communications and transmitted contents in the proposed overlay network For authorization service, mutual authorization mechanism is defined and encryption and hash algorithm are regulated to provide the confidentiality and integrity Key update: If session key is set for secure mutual communication after the authorization of each entity participating in overlay network, update method and cycle of session key is defined Authorization / access control: The right to authorize and access control of corresponding contents is set up and defined after the authorization of entities participating in overlay network Availability: If unauthorized entities are participating in overlay network, middle-subscribers and middle-publishers manage them as temporary entities There are two availability service methods One is that middle entities set a timetable and then its real-time backup information is transmitted to subscribers and publishers The other is that timetable is searched to ensure the availability when network availability is infringed Network management: The security layer of overlay network defines the policy for the entities configuring overall overlay network and the management method 677

6 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services 3) ESCORT configuration layer ESCORT Overlay Network configures the pub-sub network, referring to the basic component layer ESCORT configuration layer is consisted based on component entities Additional components are as the following (Figure 2) Mid - Mid - Pub Mid - Routi ng Node Pub Pub Routi ng Node Mid - Mid - Pub Mid - [Fig 2] ESCORT Network Class ESCORT Policy: The security policy of all entities is defined for network management and security service in ESCORT overlay network Each entity can refer to the security policy entity: entity as an end user is provided with service offered from overlay network entity is the final entity provided services authorized by publishers and subscribers through optimal routing path 32 Consist of protocol ESCORT protocol is for secure effective network communication based on ESCORT overlay network ESCORT protocol is consisted of the following five kinds Communications between publisher and publisher: When an end user in overlay network requests communications, a publisher finally authorizes and manages it through communication between a publisher and publisher If new entity participates in the network, the new participant is authorized through communications between middle entities Communications between publisher and middle-entity : In case that new entities participate as publisher in ESCORT network, middle-entities find out them and temporarily authorize and manage by temporarily grouping them until a publisher determines whether the newly participating entity is legitimate or not Communications between middle-publisher and middle-subscriber: When new unauthorized entity participates, middle-subscriber let the new entity participate by temporarily grouping If communications 678

7 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 with other subscribers is requested, middle-publisher performs intermediate role Therefore, secure communications can be performed Middle-publisher performs intermediate role for secure communications with publisher according to security policy of new entity Communications between end user and subscriber: Mutual authentication between subscribers providing contents and the end user participating in ESCORT network and session key establishment are set up When new subscriber participates in ESCORT network, this is the step that the new subscriber is authorized Routing protocol: This is the process that contents are searched by using 2MAC (Media Access Control & Message Authentication Code) in ESCORT network 33 Assumptions In order to organize the proposed ESCORT network, the following assumptions are based As reliable static elements, publishers perform secure mutual authentication process in advance and share a session key with other publishers Publishers, middle-publishers, middle-subscribers of ESCORT elements are reliable static elements Each publisher has a public bulletin board accessible to all elements This bulletin is used to publish basic event type, access type and attributes of ESCORT network Each publisher participating in ESCORT network shares session keys and and initial information with middle-publishers and middle-subscribers of the same group through secure communication All elements participating in ESCORT network have a pair of public key and private key 34 System parameters * : ESCORT configuration element parameter ( :Publisher, :scriber, Middle-publisher:, Middle-subscriber:, Extended publisher:, scriber:, New subscriber:, end user: ) : Basic event type published by publishers and defined as ( : attribute of event, : element's ID, : element's type, : publisher's public response value, : authentication level, : time stamp) : Unique call list of middle-publishers and middle-subscribers managed by each publisher : Unique call number of subscribers ( : Time stamp 679

8 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services,,,, : Random number, : IDentity of element participating in ESCORT : Secure hash function (SHA-1 or MD5) : Public key encryption algorithm : Symmetric key encryption algorithm : Secure public key's signature algorithm : Public coefficient : user's authorized list : list of end users unauthorized by publishers : Authorized end user list managed by : user's private information () : Public and private key pairs of objects 35 Architecture of the ESCORT 1) Detailed Protocol a) Communication between publishers 1 and use a public bulletin board accessible to all elements of ESCORT network to generate and publish event type, access type and attributes For event type published by, the procedure is as follows 2 and use the pre-shared session key to send encrypted information about lower level middle elements(middle-publisher, middle subscriber) 3 decrypts received from and sends information about lower level middle elements registered on to 4 and save information about shared middle elements and initialize ESCORT network based on this information b) Communication between publishers and middle-objects (1) Establishment of session key and mutual authentication with lower level element of and performs authentication to ensure secure communication with lower level middle elements of and configures them as extended elements of 680

9 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 1 calculates the following based on information about middle elements of received from communication with in the above a), and then sends, to,, 2 receives and from, decrypts with a private key and extracts random number and Then, creates and verifies If the verification result is correct, generates random and time stamp, calculates the following and sends, to,,,, 3 Receiving and, decrypts with a private key and verifies transmitted data through the following verification If the above process is correct, and calculate a mutual session key and finish mutual authentication and session key establishment also performs the above process in the same way as all of and creates a session key Mid- Mid - Mid-Pub Pub1 Pub2 Public borard Mid-Pub Mid- Mid - [Fig 3] Pub-sub Communication in ESCORT Network (2) Establishment of session key and mutual authentication with lower level element of and 1 calculates based on to perform mutual authentication with and establish a session key and generates random number Then, calculates,, and sends them to,,,, 681

10 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services 2 decrypts received from with session key shared in the above (1), extract, and verifies If the verification result is correct, sends,, to, 3 decrypts and received from with a private key and verifies and If the verification result is correct, generates random number and time stamp, calculates the following and sends,, to,,,, 4 verifies,, received from in the following procedure If the verification result is correct, uses session key shared with in the above (1) to calculate and and sends them to 5 Receiving, decrypts with and extracts and Then, decrypts with a private key to acquire and After finishing the above process, and calculate and generates as follows performs the same process as to acquire mutual authentication with lower level middle-objects of and establish a session key (3) Mutual authentication and establishment of session key when a new participates in ESCORT network 1 The new publisher sends a message requesting communication to join network to ESCORT network 2 Receiving the request message from, generates event,, and sends and to so that can be registered as an extended publisher in ESCORT network and be mutually authenticated,, 3 Receiving and from, checks a signature using 's public key and decrypts with a private key to acquire and Then, performs verification 682

11 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 If the verification result is correct, generates based on event published on a pubic bulletin board of ESCORT network and sends and to, 4 receives, sent from, decrypts as private key and verify based on which is generated and 1 5 Receiving and from, decrypts with a private key Then, based on generated from and 1, verifies If the verification result is correct, authenticates as an extended publisher and generates session key for secure communication Then, saves temporarily and performs detailed protocol of the a) Communication between publishers process using a session key to join ESCORT network c) Communications between middle-publisher and middle-subscriber (1) Communication between and 1 generates random number, calculates and and sends,, to,, 2 receives,, publishes on a public bulletin board, decrypts, checks 's signature and verifies If the verification result is correct, generates, calculates and sends, to,, 3 receives, from, decrypts with a private key, checks 's signature with 's public key, extracts and and verifies If the verification result is correct, generates random number,, to establish a session key with, calculates the following and sends,, to 683

12 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services,, 4 receives,,, publishes, an event responding to on a public bulletin board, decrypts, checks 's signature and verifies and If the verification result is correct, generates, calculates and sends, to,, 5 receives, from, checks, an message responding to on the public bulletin board, decrypts with a private key and performs the verification If the verification result is correct, sends a message to complete the communication to and then sends this message to Then, and finish mutual authentication process and generates session key (2) Communication between and 1 generates event generating message and time stamp Then, encrypts with session key set in the (1) and sends, to, 2 receives, decrypts with a session key shared with to acquire and save an end user's managed by Then, extracts with 's public key from and verifies with and If the verification result is correct, publishes on a public bulletin board and generates time stamp and random number Then, calculates, and sends them to, 3 receives, decrypts with a private key and verifies If the verification result is correct, generates event message, calculates, sends, to 684

13 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월, 4 receives,, decrypts with a private key, checks 's signature with 's public key, extracts and verifies If the verification result is correct, publishes on a public bulletin board, generates time stamp, calculates and sends, to, 5 receives,, decrypts with shared with and verifies If the verification result is correct, sends a message notifying event completion to Then, sends this message to to finish communication between and Then, and generates d) The registration and public phase of user and subscriber (1) Mutual authentication and establishment of session key between end users and subscribers 1 user requests for 's public key to establish a session key and perform mutual authentication with subscriber of Then, signs 's public key with a private key and sends it to 2 acquires 's public key, calculates, and sends,, to,, 3 receives,,, decrypts with a private key to acquire, and verifies If the verification result is correct, publishes on a public bulletin board After publishing the event, calculates based on pre-designated with, sends to, calculates, and sends, to the,, 685

14 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services, 4 receives, and verifies If the verification result is correct, calculates, decrypts and extracts, calculates and receives contents requested by through (2) Authentication and publish of new subscribers 1 wishing to join the network newly requests for 's public key Then, signs 's public key with 's private key and sends it to 2 checks the signature with 's public key, acquires 's public key, generates, and a and sends encrypted value, and event message to,, 3 receives,, from, decrypts with its private key, acquires and, decrypts using and verifies If the verification result is correct, checks the signature of 's with 's public key Then, checks currently available contents and service lists and publishes them on the pubic bulletin board generates 's unique call number and Then, based on this information, calculates, and sends them along with to,, 4 receives,,, decrypts with a private key and verifies If the verification result is correct, generates and, calculates the following and sends,,, to,,, 5 receives,,, calculates and verifies If the verification result is correct, generates time stamp, calculates and sends, to, 686

15 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 6 calculates based on, received from, and then verifies 's integrity If the verification result is correct, and calculates to establish a mutual session key 4 The analysis of ESCORT scheme 41 Analysis of security The proposed scheme has the following security compared to the existing scheme ACI(Authentication, Confidentiality, Integrity): The proposed scheme provides mutual authentication service for each element to maintain security of general ACI Moreover, the proposed scheme aims to ensure secure communication through encryption of public keys and establishment of session keys The proposed scheme is also intended to use hash functions to ensure integrity of transmitted data and maintain security of general ACI Encrypted communication and access control - Encrypted communication: The proposed scheme is based not on distributed type but on centralized type in order to detect participants' intended abnormal behaviors ESCORT network designates middle elements to ensure security based on reliable establishes session key through middle element instead of direct communication with when new elements join the network; performs mutual authentication and maintains security sessions As a result, reliable central elements are not directly affected - Access control: When a participant's intended abnormal behavior is detected, this fact is delivered to middle elements in accordance with 's policy Based on this fact, information on the participant is checked from a pubic bulletin board and and security policy such as excluding from elements or removing session keys is established Application of this policy can perform access control in relation to detecting intended abnormal behaviors Protection of elements' privacy: In terms of Whitewashing-related attacks, this paper uses protection of elements' privacy to ensure security In particular, when public ID is used to respond to attacks related to elements' ID, discrete logarithm such as is used to maintain security When communication with each element is performed to guarantee security against Sybil attacks, is calculated after mutual authentication to perform session key-based communication Security of the proposed service: The proposed scheme performs secure mutual authentication services for communication between elements, and establishes relevant session keys Therefore, only authenticated 687

16 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services elements can decrypt packets and check whether exchanged messages are modified to provide security for the provided service Availability: When attackers disguise as authorized subscribers or publishers to provide contents or transmit events, the proposed ESCORT network can detect those attackers and maintain network security against DoS attacks Centralized management: The proposed scheme consists of reliable central elements to ensure security of keys and users in distributed environment and middle elements to manage end users, providing reliable centralized management 42 Analysis of effectiveness This paper aims to analyze the proposed scheme's node exploration depending on message transmission suggested in TP2P(TP2P: Topology-based Peer-to-Peer) environment [2] and compare the proposed scheme with one of the centralized scheme, Mudhakar to analyze efficiency of and Then, the paper suggests the proposed scheme's limitation considering its characteristics In order to analyze node exploration depending on message transmission, the followings are defined The size of a circular identifier:, Number of : Average number of end users that exist in a subnet:, Table Size: Probability that a node for message transmission exists in its subnet: The probability that an exploration node in the proposed scheme exists closer to a target node than a node designated in a public routing table is The probability of finding out a node for message transmission in its is The probability of finding out a node for message transmission in other is Therefore, may be different depending on size of hash function table used in ESCORT network as follows: In addition, Mudhakar [12] [13] scheme suggests the probability of transmitting from to (ie, Pr ) as follows: Pr ( is a part of network node, is depth, and is increase in communication cost) Thus, when the same is based for the proposed ESCORT network, the probability of reaching is shown in Figure 5 688

17 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 [Fig 4] Probability of ESCORT network navigation In case that Mudhakar scheme ( ) is analyzes based on same, probability of reaching sub has better results than ESCORT scheme ( ) Therefore, though the security of the proposed ESCORT network improvers than Mudhakar approach in the same environment, whereas, the cost-effectiveness become lower On the other hand, there is a result can be derived from possibility of reached the sub object improve It also cause lowing efficiency of the network, if it applies a large network because suggested scheme consists of centralized form Specifically, there is vulnerability that efficiency of network become low because the amount of security-related operations and mutual communication for mutual authentication is much more To complement inefficiencies, there is possibility to apply in overlay network where security is the best priority for special small security services required security rather than large P2P In addition, Mudhakar scheme [12] presents probability, Pr, of reaching from to When Mudhakar scheme( ) is analyzed based on the same, the probability of reaching sub is improved compared to the proposed scheme( ) In summary, the proposed ESCORT network provides better security and less cost-effectiveness than Mudhakar scheme based on the same environment, but the probability of reaching a lower level is more enhanced in the proposed ESCORT network Besides, the proposed scheme is a centralized management type, deteriorating network efficiency when it is applied to large scale network In particular, large amount of computation related to security and communication for mutual authentication deteriorates network efficiency In order to compensate this inefficiency, the proposed scheme can be applied to overlay networks requiring security for specific small-scale P2P rather than large-scale P2P 689

18 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services [Fig 5] Probability of reaching sub 5 Conclusions Currently, researches on secure overlay networks to provide P2P service which accounts for most of Internet traffic are actively conducted This paper tried to conduct centralized type of overlay networks to ensure secure P2P service Rapid growth in telecommunication increases demand of individual telecommunication In particular, researches on ubiquitous computing are highly attracted as next-generation IT technology Therefore, according to this paper, researches on the existing overlay networks are vulnerable to various network attacks and node insecurity Moreover, there are problems with node cooperation and explicit mutual authentication service because reliable organizations do not exist in distributed environment Thus, researches how to compensate the problems have been conducted The proposed ESCORT network suggests appropriate architectures and detailed protocols to provide consistent network management and security through reliable organizations However, for the proposed scheme, each element is authenticated through communication with reliable central elements, which increases traffic of central elements and deteriorates the overall network efficiency That is, the proposed scheme causes not only increasing overhead and cost related to central elements but also deteriorated efficiency of the overall network Therefore, it is intended to conduct researches on routing protocols as well as on additional protocols and clear security policies to ensure security against participants' participation/leave ACKNOWLEDGMENT This paper has been supported by the Software R&D program of KCA [2011/ , Development of global collaborative integrated security control system 690

19 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 6호 2011년 12월 References [1] A Rowstron and P Druschel, Pastry:Scalable, decentralized object location and routing for large-scale peer-to-peer systems, Proc of the Middle-ware 2001, 2001, pp [2] BK Cha, DY Han, YS Son and KS Kim, TP2P: Topology-based Peer-to-Peer System Efficient Resources Lookup, KIISE Journals, vol 34, no 2, 2008, pp [3] D Doval, D O'Mahony, Overlay Networks: A Scalable Alternative for P2P, IEEE Internet Computing, vol 7, no 4, 2003, pp79-82 [4] GP Jesi, D Gavidia, C Gamage, and M van Steen, A Secure Peer Sampling Service as a Hub attack Countermeasure, UBLCS [5] HC Kwon, JH Hah, JS Jang, DHT(Distributed Hash Table) P2P based overlay network security threat analysis, The journal of KISC, vol 15, no 6, 2006, pp60-67 [6] HC Kwon, YH Moon, JB Gu, SK Kho, JH Hah and JS Jang, Standardization and Technology Trend of Peer-to-Peer Communication, ETRI Report, vol 22, no 1, 2007, pp11-23 [7] I Baumgart and S Mies, S/Kademlia: A practicable approach towards secure key-based routing, ICPADS '07, 2007, pp 1-8 [8] I Stoica, R Morris, D Karger, M Frans Kaashoek and H Balakrishnan, Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, ACM SIGCOMM 2001, 2001, pp [9] K Singh and H Schulzrinne, Data Format and Interface to an External Peer-to-Peer Network for SIP Location Service, IETF, 2006 [10] M Caporuscio, A Carzaniga, and A Wolf, "Design and Evaluation of a Support Service for Mobile, Wireless Publish/scribe Applications, IEEE Transactions on Software Engineering, 2003, vol 29, no 12, pp [11] M Castro, P Drushel, A Ganesh, A Rowstron and D Wallach, Secure routing for structured peer-to-peer overlay networks, OSDI, 2002, pp [12] Mudhakar Srivatsa, Security Architecture and Protocols for Overlay Network Services, Georgia Institute of Technology, a thesis for a doctorate, 2007 [13] SCapkun, J-PHubaux and L Buttyan, Mobility Helps Peer-to-Peer Security, IEEE Transactions on Mobile Computing, vol 5, no 1, 2006, pp [14] S Buchegger and A Datta, A case for P2P infrastructure for social networks: Opportunities and challenges, Proc of 6th International Conference on Wireless On-demand Network Systems and Services (WONS), 2009, pp45-52 [15] IRTF P2P Research Group Website, ( 691

20 ESCORT:Secure P2P Protocol for Global Cooperation in Overlay Network Services Author DaeHee Seo Present Senior Member of Engineering Staff in Electronics and Telecommunications Research Institute, Korea Research professor in Ewha womans University, Korea 2007 Senior researcher in Korea Information Security Agency, Korea SoonChunHyang University, Korea (MS-PhD in Computer Software Engineering) Research interests : Mobile Network security, N-Screen, Overlay Network security, Key Management, Security Products Evaluation Gaeil An 2001 Present Senior Member of Engineering Staff in Electronics and Telecommunications Research Institute, Korea visiting researcher in Syracuse University, US Chung-Nam National University in Korea (MS-PhD in Computer Engineering) Research interests : Network Security, Mobile Device Security, Security Information Management, and Network Simulation JongHyun Kim Present Electronics and Telecommunications Research Institute, Korea 2005 University of Oklahoma, USA (PhD Computer Science) 2000 University of Oklahoma, USA (MS Computer Science) Research interests : Information Security, Cybersecurity, Network Management and IP Traceback Jang-Mi Beak Present Visiting professor in SoonChunHyang University, Korea Part-time lecture in SoonChunHyang University, Korea Post-Doc in Howard University, US SoonChunHyang University, Korea (MS-PhD in Computer Software Engineering) Research interests : Multimedia Network System, Mobile System Development and Design, Ubiquitous Healthcare System Development, and Embedded System Dong- Cho 1979 ~ 1986 Seoul National University in Korea (MS-PhD) 1985 ~ Present Prof of Ewha Womans University, Korea 1996 ~ 1997 Univ of California, Irvine Dept of ECE Visiting Scholar Research interests: modeling of mobile computing devices, embedded systems, systems automation of secured mobile environment 692

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security

Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,

More information

Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature

Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature A Thesis for the degree of Master Quantitative Analysis of 2-tier P2P- SIP Architecture with ID-based Signature Chang-Hwan Lee School of Engineering Information and Communications University 2008 i Quantitative

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

Vulnerabilities of P2P Systems and a Critical Look at their Solutions

Vulnerabilities of P2P Systems and a Critical Look at their Solutions Vulnerabilities of P2P Systems and a Critical Look at their Solutions Marling Engle & Javed I. Khan {mengle javed}@cs.kent.edu Networking and Media Communications Research Laboratories Computer Science

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

Chord - A Distributed Hash Table

Chord - A Distributed Hash Table Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing

More information

The Design of the Network Service Access Control System through Address Control in IPv6 Environments

The Design of the Network Service Access Control System through Address Control in IPv6 Environments 174 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.6, June 2006 The Design of the Network Service Access Control System through Address Control in IPv6 Environments Summary

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment , pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,lshi@tssg.org

More information

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack You Joung Ham Graduate School of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyeonggi, Rep. of Korea

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

Identity Theft Protection in Structured Overlays

Identity Theft Protection in Structured Overlays Identity Theft Protection in Structured Overlays Lakshmi Ganesh and Ben Y. Zhao Computer Science Department, U. C. Santa Barbara {lakshmi, ravenben}@cs.ucsb.edu Abstract Structured peer-to-peer (P2P) overlays

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Identity Theft Protection in Structured Overlays

Identity Theft Protection in Structured Overlays Appears in Proceedings of the 1st Workshop on Secure Network Protocols (NPSec 5) Identity Theft Protection in Structured Overlays Lakshmi Ganesh and Ben Y. Zhao Computer Science Department, U. C. Santa

More information

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Attacks Against Peer-to-peer Networks and Countermeasures

Attacks Against Peer-to-peer Networks and Countermeasures Attacks Against Peer-to-peer Networks and Countermeasures Lin Wang Helsinki University of Technology lwang@cc.hut.fi Abstract Peer-to-peer (P2P) networks have many distinct aspects that are different from

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

An Innovative Two Factor Authentication Method: The QRLogin System

An Innovative Two Factor Authentication Method: The QRLogin System An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

ssumathy@vit.ac.in upendra_mcs2@yahoo.com

ssumathy@vit.ac.in upendra_mcs2@yahoo.com S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

R-Chain: A Self-Maintained Reputation Management System in P2P Networks

R-Chain: A Self-Maintained Reputation Management System in P2P Networks R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ

More information

Authentication Methods for USIM-based Mobile Banking Service

Authentication Methods for USIM-based Mobile Banking Service Authentication Methods for USIM-based Mobile Banking Service Jonghyun Baek 1, Young-Jun Kim 1, Yoojae Won 1, HeungYoul Youm 2 Korea Information Security Agency, Seoul, Korea 1 Soon Chun Hyang University,

More information

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division

More information

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Signature Amortization Technique for Authenticating Delay Sensitive Stream Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication

More information

A P2PSIP event notification architecture

A P2PSIP event notification architecture A P2PSIP event notification architecture Georgios Panagiotou Appear Networks AB, Kista Science Tower, 164 51 Kista, Sweden Email: georgios.panagiotou@appearnetworks.com Alisa Devlic Appear Networks AB,

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

A Study on Data Analysis Process Management System in MapReduce using BPM

A Study on Data Analysis Process Management System in MapReduce using BPM A Study on Data Analysis Process Management System in MapReduce using BPM Yoon-Sik Yoo 1, Jaehak Yu 1, Hyo-Chan Bang 1, Cheong Hee Park 1 Electronics and Telecommunications Research Institute, 138 Gajeongno,

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services , pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Home Device Authentication Framework and Implementation

Home Device Authentication Framework and Implementation Home Device Authentication Framework and Implementation Yun-kyung Lee, Jong-wook Han, Deok Gyu Lee, Jeong-nyeo Kim Information Security Division, Electronics and Telecommunications Research Institute neohappy@etri.re.kr

More information

What is a SSL VPN and How Does it Work?

What is a SSL VPN and How Does it Work? Acceleration of Data through SSL Virtual Private Networks Rob Jansen University of Minnesota, Morris 600 East Fourth Street Morris, MN 56267 (123) 456-7890 jans0184@morris.umn.edu ABSTRACT A Virtual Private

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Peer-to-Peer Replication

Peer-to-Peer Replication Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................

More information

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,

More information

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS

A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering anidathi@yahoo.co.in jkumaribharat@yahoo.com

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Secure Communication in a Distributed System Using Identity Based Encryption

Secure Communication in a Distributed System Using Identity Based Encryption Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA tjstadin@us.ibm.com Abstract Distributed systems require the ability to communicate

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing Nirupadi Tidigol, Thrilochana Kumara Y.P, T.P.Lokesh, nirupadi.tidigol@gmail.com thrilochankumaryp@gmail.com

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr

More information

A Layered Signcryption Model for Secure Cloud System Communication

A Layered Signcryption Model for Secure Cloud System Communication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086

More information

Secure SCADA Network Technology and Methods

Secure SCADA Network Technology and Methods Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea sntdvl@yahoo.com, taihoonn@paran.com Abstract: The overall

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Cyber Forensic for Hadoop based Cloud System

Cyber Forensic for Hadoop based Cloud System Cyber Forensic for Hadoop based Cloud System ChaeHo Cho 1, SungHo Chin 2 and * Kwang Sik Chung 3 1 Korea National Open University graduate school Dept. of Computer Science 2 LG Electronics CTO Division

More information

A Study on the Dos Prevention System for SPT-based Sync Flooding Protection

A Study on the Dos Prevention System for SPT-based Sync Flooding Protection , pp.57-66 http://dx.doi.org/10.14257/ijsia.2015.9.12.07 A Study on the Dos Prevention System for SPT-based Sync Flooding Protection Keun-Heui Kim 1, Young-Mo Kang 2, Mi-Ran Han 3, and Jong-Bae Kim 4*

More information

User authentication in SIP

User authentication in SIP User authentication in SIP Pauli Vesterinen Helsinki University of Technology pjvester@cc.hut.fi Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Distributed Hash Tables in P2P Systems - A literary survey

Distributed Hash Tables in P2P Systems - A literary survey Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer

More information

Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds

Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds Kokilavani.K, Department Of Pervasive Computing Technology, Kings College Of Engineering, Punalkulam, Tamil nadu Abstract This paper

More information

A Reputation Management System in Structured Peer-to-Peer Networks

A Reputation Management System in Structured Peer-to-Peer Networks A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

Load Balancing in Distributed Systems: A survey

Load Balancing in Distributed Systems: A survey Load Balancing in Distributed Systems: A survey Amit S Hanamakkanavar * and Prof. Vidya S.Handur # * (amitsh2190@gmail.com) Dept of Computer Science & Engg, B.V.B.College of Engg. & Tech, Hubli # (vidya_handur@bvb.edu)

More information

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

Secure Networking Using Mobile IP

Secure Networking Using Mobile IP Secure Networking Using Mobile IP Alexandros Karakos and Konstantinos Siozios Democritus University of Thrace eepartment of Electrical and Computer Engineering GR-671 00 Xanthi, GREECE Abstract. The increasing

More information

Efficient Data Transmission For Wireless Sensor Networks

Efficient Data Transmission For Wireless Sensor Networks Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones 보안공학연구논문지 (Journal of Security Engineering), 제 8권 제 3호 2011년 6월 Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones Rosslin John Robles 1) and Tai-hoon Kim 2) Abstract

More information

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 41 Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing Abstract-- It has been widely observed

More information

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram. Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Bok-Nyong Park 1, Wonjun Lee 1 and Christian Shin 2 1 Dept. of Computer Science and Engineering, Korea University,

More information

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA

A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com

More information