Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Secure and Lightweight Subflow Establishment of Multipath-TCP

Authors
Noh, GunheePark, HoorinRoh, HeejunLee, Wonjun
Issue Date
2019
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
MPTCP; network security; ADD_ADDR attack; connection hijacking
Citation
IEEE ACCESS, v.7, pp.177438 - 177448
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
7
Start Page
177438
End Page
177448
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/68896
DOI
10.1109/ACCESS.2019.2957434
ISSN
2169-3536
Abstract
Multipath Transmission Control Protocol (MPTCP) is an approach towards high-throughput and efficient load balancing over multiple paths. Each of paths forms a TCP connection with an IP address, and those can be implemented as multiple network interfaces or multiple ports within a network interface. In this paper, we focus on the multiple network interfaces environment. Each network interface with an IP address is called as a subflow. A subflow is a TCP connection which can have a different internet path identified by IP addresses of source and destination network interfaces. To control these multiple subflows, MPTCP supports many options. Specifically, to establish a new subflow, MPTCP uses an ADD_ADDR option. A host sends ADD_ADDR option to inform another host of its IP address, and then, the host receiving ADD_ADDR option tries to establish a subflow at the address of ADD_ADDR option. However, by forging the ADD_ADDR option, an attacker can create a fake subflow that passes through itself and eventually hijack the connection between both end hosts. In a previous study, Hash-based Message Authentication (HMAC) was added to the ADD_ADDR option, preventing it from being forged. Nevertheless, since the keys for generating HMAC can be leaked during three-way handshake, a variant of the ADD_ADDR attack called the persistent ADD_ADDR attack can be possible. To this end, we propose a protocol that can prevent the ADD_ADDR attacks by backward confirmation of the ADD_ADDR option without encryption. The main idea of our proposal is to apply a digital signature scheme for the backward confirmation. We show security analysis for the proposed protocol and compare with the previous studies in terms of time/space overheads.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Won jun photo

Lee, Won jun
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE