|
Contents |
7 |
|
|
Preface |
9 |
|
|
Chapter 1 INTRODUCTION |
12 |
|
|
Chapter 2 ABSTRACT PROTOCOL NOTATION |
18 |
|
|
1. PROCESSES AND CHANNELS |
18 |
|
|
2. CONSTANTS, VARIABLES, AND ACTIONS |
19 |
|
|
3. STATE TRANSITION DIAGRAM |
22 |
|
|
4. PROCESS ARRAYS, PARAMETERS, AND PARAMETERIZED ACTIONS |
25 |
|
|
Chapter 3 ABSTRACT SECURE PROTOCOLS |
28 |
|
|
1. ASSUMPTIONS ABOUT THE ADVERSARY |
29 |
|
|
2. SECURITY KEYS |
29 |
|
|
3. MESSAGE DIGESTS |
31 |
|
|
4. NONCES |
31 |
|
|
5. TIMEOUT ACTIONS |
32 |
|
|
6. AN EXAMPLE PROTOCOL WITH SECURITY FEATURES |
32 |
|
|
Chapter 4 DENIAL-OF-SERVICE ATTACKS |
36 |
|
|
1. COMMUNICATION-STOPPING ATTACKS |
37 |
|
|
2. RESOURCE-EXHAUSTING ATTACKS |
39 |
|
|
Chapter 5 SECURE ADDRESS RESOLUTION PROTOCOL |
42 |
|
|
1. ARCHITECTURE OF SECURE ADDRESS RESOLUTION |
42 |
|
|
2. THE INVITE-ACCEPT PROTOCOL |
46 |
|
|
3. THE REQUEST-REPLY PROTOCOL |
52 |
|
|
4. EXTENSIONS |
58 |
|
|
4.1 Insecure Address Resolution |
59 |
|
|
4.2 A Backup Server |
64 |
|
|
4.3 System Diagnosis |
65 |
|
|
4.4 Serving Multiple Ethernets |
65 |
|
|
Chapter 6 WEAK HOP INTEGRITY PROTOCOL |
66 |
|
|
1. SECRET EXCHANGE PROTOCOL |
67 |
|
|
2. WEAK INTEGRITY CHECK PROTOCOL |
73 |
|
|
Chapter 7 STRONG HOP INTEGRITY USING SOFT SEQUENCE NUMBERS |
78 |
|
|
1. SOFT SEQUENCE NUMBER PROTOCOL |
78 |
|
|
2. STRONG INTEGRITY CHECK PROTOCOL |
81 |
|
|
Chapter 8 STRONG HOP INTEGRITY USING HARD SEQUENCE NUMBERS |
86 |
|
|
1. HARD SEQUENCE NUMBER PROTOCOL |
87 |
|
|
2. A PROTOCOL WITH SAVE AND FETCH OPERATIONS |
89 |
|
|
3. CONVERGENCE OF NEW HARD SEQUENCE NUMBER PROTOCOL |
94 |
|
|
4. APPLICATION OF SAVE AND FETCH IN STRONG HOP INTEGRITY PROTOCOL |
97 |
|
|
5. TRADEOFFS BETWEEN SOFT SEQUENCE NUMBERS AND HARD SEQUENCE NUMBERS |
97 |
|
|
Chapter 9 IMPLEMENTATION CONSIDERATIONS |
99 |
|
|
1. KEYS AND SECRETS |
99 |
|
|
2. TIMEOUTS |
100 |
|
|
3. SEQUENCE NUMBERS |
100 |
|
|
4. MESSAGE OVERHEAD |
102 |
|
|
Chapter 10 OTHER USES OF HOP INTEGRITY |
104 |
|
|
1. MOBILE IP |
104 |
|
|
2. SECURE MULTICAST |
108 |
|
|
3. SECURITY OF ROUTING PROTOCOLS |
111 |
|
|
3.1 Security of RIP |
112 |
|
|
3.2 Security of OSPF |
113 |
|
|
3.3 Security of RSVP |
115 |
|
|
4. SECURITY IN AD HOC NETWORKS AND SENSOR NETWORKS |
116 |
|
|
References |
118 |
|
|
Index |
122 |
|