Authentication under Denial-of-Service Attacks

B. Weiss (Austria)

Keywords

Authenticated Communication, Denial-of-Service Attacks, Client Puzzles, Message Authentication Codes, Ad-hoc Networks, Hardware Message Filter

Abstract

This paper is concerned with authenticated communication using public keys, which has been designed to minimize the potential for denial-of-service attacks in an ad-hoc net work. To this aim, we use substantial hardware support and require certain properties from the network. We show how communication partners acquire public keys and how keys can be revoked and changed. We consider various attacks and analyze their effect on our system. It turns out that we can diminish the attack possibilities, but cannot completely protect our system from denial-of-service attacks due to its ad-hoc nature.

Important Links:



Go Back