使用无密钥签名方案防止单点登录模拟攻击

Amerah A. Alabrah, M. Bassiouni
{"title":"使用无密钥签名方案防止单点登录模拟攻击","authors":"Amerah A. Alabrah, M. Bassiouni","doi":"10.1109/WMNC.2017.8248852","DOIUrl":null,"url":null,"abstract":"The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Preventing single sign-on impersonation attacks with a keyless signature scheme\",\"authors\":\"Amerah A. Alabrah, M. Bassiouni\",\"doi\":\"10.1109/WMNC.2017.8248852\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.\",\"PeriodicalId\":338777,\"journal\":{\"name\":\"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)\",\"volume\":\"350 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WMNC.2017.8248852\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WMNC.2017.8248852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

目前许多Internet服务(如b谷歌)的多服务器环境以及单点登录(SSO)解决方案的可用性带来了有前途的技术。许多这样的应用程序和类似的应用程序为客户机提供了使用一组用户名和密码登录的功能,从而减轻了使用多个身份和多个密码的需要。尽管很有前途,但SSO机制需要非常健壮,并为用户提供最大程度的身份验证。由于单点登录中服务提供者和客户端之间的身份验证通道是单向的,并且缺乏最新的身份验证密钥,研究人员指出了这种方案存在的漏洞,导致了冒充攻击等攻击。在本文中,我们提出了一种解决上述问题的无密钥签名方案。通过使用Merkle散列树和散列日历的组合,SSO中的身份提供者可以定期创建客户端和服务提供者使用的身份验证密钥。后两者之间的通信由单向散列链保护,以实现双向身份验证。通过仿真实验对该方案进行了评价,并采用通信和计算代价进行了评价。分析验证了服务提供者和客户端之间的单向散列链的最佳长度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Preventing single sign-on impersonation attacks with a keyless signature scheme
The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信