Abstract
Traditional network communication methods lack endogenous security mechanisms, which is the root cause of network security problems, e.g., spoofing identity and address forgery. This paper proposes a secure communication method based on the message hash chain, referred to as the chain communication method or MHC method. We use the message hash chain to ensure that the transmission process is immutable, non-repudiation, reliability, and the integrity and synchronization of the message. At the same time, we can sign and authenticate data streams in batches through chain signature and authentication technology, which can significantly reduce the overhead of signature and authentication, thereby improving the efficiency of secure message transmission. This paper formally proves the security of the message hash chain, conducts an in-depth analysis of the reliability of the MHC method, and conducts relevant experimental tests. The results show that the average transmission efficiency of the MHC method applied at the network layer is about 70% lower than that of the IP protocol communication method without a security mechanism. However, it is about 5% higher than the average transmission efficiency of the non-repudiation IPSec protocol communication method. The average transmission efficiency of the MHC method is about 23.5 times higher than that of the IP protocol communication method with the packet-by-packet signature. It is easier to ensure the non-repudiation of the data stream.
Funder
National Key Research and Development Program of China
Scientific and Technological Innovation Service Capacity Building-Cyberspace Security Discipline Innovation Platform Construction Fund Project
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference25 articles.
1. IP Security (IPsec) and Internet Key Exchange (IKE)
https://www.rfc-editor.org/rfc/rfc6071
2. A Cryptographic Tour of the IPsec Standards;Kenneth;Inf. Secur. Tech. Rep.,2006
3. Reflective Denial-of-Service based on IKEv2 Protocol;Zhao;Commun. Technol.,2019
4. IP Authentication Header
https://www.rfc-editor.org/rfc/rfc4302
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献