Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement

被引:0
作者
Yao Z. [1 ,2 ]
Zhu Z. [1 ,2 ]
Ye G. [1 ,2 ]
机构
[1] College of Computer and Cyber Security, Fujian Normal University, Fuzhou
[2] Fujian Engineering Research Center of Public Service Big Data Mining and Application, Fuzhou
来源
Tongxin Xuebao/Journal on Communications | 2021年 / 42卷 / 08期
基金
中国国家自然科学基金;
关键词
Dynamic host configuration protocol; Key agreement; Man-in-the-middle attack; Message authentication;
D O I
10.11959/j.issn.1000-436x.2021154
中图分类号
学科分类号
摘要
In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed. A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden. On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source. By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks. Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6. © 2021, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:103 / 110
页数:7
相关论文
共 22 条
[1]  
WANG H B, WANG J H, WANG J L, Et al., Squeezing the gap: an empirical study on DHCP performance in a large-scale wireless network, IEEE/ACM Transactions on Networking, 28, 2, pp. 832-845, (2020)
[2]  
AL-ANI A, ANBAR M, HASBULLAH I H, Et al., Authentication and privacy approach for DHCPv6, IEEE Access, 7, pp. 73144-73156, (2019)
[3]  
CONTI M, DRAGONI N, LESYK V., A survey of man in the middle attacks, IEEE Communications Surveys & Tutorials, 18, 3, pp. 2027-2051, (2016)
[4]  
DROMS R., Authentication for DHCP messages, (2001)
[5]  
YOUNES O S., A secure DHCP protocol to mitigate LAN attacks, Journal of Computer and Communications, 4, 1, pp. 39-50, (2016)
[6]  
YOO K J, KIM E G., Design and implementation of DHCP supporting network attack prevention, Journal of the Korea Institute of Information & Communication Engineering, 20, 4, pp. 747-754, (2016)
[7]  
ZHANG F Q, CHEN L., OTP_SAM: DHCP security authentication model based on OTP, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design, pp. 346-350, (2016)
[8]  
DINU D D, TOGAN M., DHCP server authentication using digital certificates, 2014 10th International Conference on Communications, pp. 1-6, (2014)
[9]  
TRIPATHI N, HUBBALLI N., A probabilistic anomaly detection scheme to detect DHCP starvation attacks, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, pp. 1-6, (2016)
[10]  
CALVERT C, KHOSHGOFTAAR T M, NAJAFABADI M M, Et al., A procedure for collecting and labeling man-in-the-middle attack traffic, Inter-national Journal of Reliability, Quality and Safety Engineering, 24, 1, (2017)