원문정보
초록
영어
Timestamps are used to prevent replay attacks in authentication or key distribution protocols; i.e., an authentication message is rejected if the timestamp in the message is judged to be not fresh. Messages that arrive within an acceptance time window are assumed to be legitimate; therefore, we need to choose a proper acceptance time window to mitigate replay attacks while maintaining a high success rate for legitimate authentication requests. This paper discusses the performance of authentication protocols based on intensive simulations with various acceptance time windows and network conditions. Our experimental results show that a secure acceptance time window can be properly selected based on the statistical distribution of the message delay time for legitimate authentication messages.
목차
1. Introduction
2. Related Works
2.1 Replay Attack
2.2 Kerberos Protocol
2.3 Acceptance Time Window
2.4 Timestamp-based Authentication Protocols
3. Relation between the timestamp acceptance window and repla attack
4. Method to Set an Acceptance Time Window
5. Simulation
5.1 Simulation Environment
5.2 Simulation Mehod
5.3 Simulation result
6. Conclusion
References
