Timestamps are used to prevent replay attacks in authentication or key distribution protocols; i.e., an authentication message is rejected if the timestamp in the message is judged to be not fresh. Messages that arrive within an acceptance time window are assumed to be legitimate; therefore, we need to choose a proper acceptance time window to mitigate replay attacks while maintaining a high success rate for legitimate authentication requests. This paper discusses the performance of authentication protocols based on intensive simulations with various acceptance time windows and network conditions. Our experimental results show that a secure acceptance time window can be properly selected based on the statistical distribution of the message delay time for legitimate authentication messages.
목차
Abstract 1. Introduction 2. Related Works 2.1 Replay Attack 2.2 Kerberos Protocol 2.3 Acceptance Time Window 2.4 Timestamp-based Authentication Protocols 3. Relation between the timestamp acceptance window and repla attack 4. Method to Set an Acceptance Time Window 5. Simulation 5.1 Simulation Environment 5.2 Simulation Mehod 5.3 Simulation result 6. Conclusion References
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업