{"title":"网络访问控制中自认证Internet协议的设计","authors":"Parinya Thamthawornsakul, S. Sittichivapak","doi":"10.1109/ECTICON.2016.7561273","DOIUrl":null,"url":null,"abstract":"This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, local network devices needing to access protected networks have to attach the options to packet header before sending to destination through a network access controller or commonly known as a gateway. Internet Protocol packets with options are verified on the gateway, the Keyed-Hash Message Authentication Code is used for checking integrity of data and the timestamp is used for replay attack mitigation. Packets passing all processes would be allowed to access to the protected networks. The design of self-authenticated Internet Protocol provides a protection of sending source spoofed packets from local network causing damage to other networks and also provides high reliability of source identification.","PeriodicalId":200661,"journal":{"name":"2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"880 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A design of self-authenticated Internet Protocol for Network Access Control\",\"authors\":\"Parinya Thamthawornsakul, S. Sittichivapak\",\"doi\":\"10.1109/ECTICON.2016.7561273\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, local network devices needing to access protected networks have to attach the options to packet header before sending to destination through a network access controller or commonly known as a gateway. Internet Protocol packets with options are verified on the gateway, the Keyed-Hash Message Authentication Code is used for checking integrity of data and the timestamp is used for replay attack mitigation. Packets passing all processes would be allowed to access to the protected networks. The design of self-authenticated Internet Protocol provides a protection of sending source spoofed packets from local network causing damage to other networks and also provides high reliability of source identification.\",\"PeriodicalId\":200661,\"journal\":{\"name\":\"2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)\",\"volume\":\"880 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECTICON.2016.7561273\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 13th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECTICON.2016.7561273","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A design of self-authenticated Internet Protocol for Network Access Control
This paper presents an application of Internet Protocol Options for enhancing self-authenticated feature to the Internet Protocol. The options consist of Keyed-Hash Message Authentication Code and timestamp. In the network access control system, local network devices needing to access protected networks have to attach the options to packet header before sending to destination through a network access controller or commonly known as a gateway. Internet Protocol packets with options are verified on the gateway, the Keyed-Hash Message Authentication Code is used for checking integrity of data and the timestamp is used for replay attack mitigation. Packets passing all processes would be allowed to access to the protected networks. The design of self-authenticated Internet Protocol provides a protection of sending source spoofed packets from local network causing damage to other networks and also provides high reliability of source identification.