Security Protocols for Networks and Internet: A Global Vision

The use of communication networks and the Internet has rocketed in the last years. From the traditional, wired settings to the wireless ones, connectivity is becoming almost ubiquitous in modern societies. Security concerns are critical, such as data forgery or tampering. In order to address these needs, security protocols have been proposed for each setting over the years. This chapter introduces the essential aspects of several representative protocols concerning authentication, remote connection, secure data exchange, and wireless protection for networks and Internet. Remarkably, basic notions on well-known protocols such as Kerberos are presented without entering into low-level details.

[1]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[2]  Philip Koopman,et al.  32-bit cyclic redundancy codes for Internet applications , 2002, Proceedings International Conference on Dependable Systems and Networks.

[3]  Tom Yu,et al.  Kerberos Authorization Data Container Authenticated by Multiple Message Authentication Codes (MACs) , 2016, RFC.

[4]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[5]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[6]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[7]  Tatu Ylönen,et al.  The Secure Shell (SSH) Authentication Protocol , 2006, RFC.

[8]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[9]  Tatu Ylönen,et al.  The Secure Shell (SSH) Protocol Architecture , 2006, RFC.

[10]  Bruce Potter,et al.  Wireless Security's Future , 2003, IEEE Secur. Priv..

[11]  Timothy Stapko CHAPTER 4 – The Secure Sockets Layer , 2008 .

[12]  Mohammed Mahmudur Rahman,et al.  A comparative study of WLAN security protocols: WPA, WPA2 , 2015, 2015 International Conference on Advances in Electrical Engineering (ICAEE).

[13]  Daniel J. Barrett,et al.  Ssh, the secure shell: the definitive guide, second edition , 2005 .

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Ronald L. Rivest,et al.  Spritz - a spongy RC4-like stream cipher and hash function , 2016, IACR Cryptol. ePrint Arch..

[16]  William Allen Simpson,et al.  PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.