|
P
Paillier Encryption and Signature Schemes
Open ProblemsBog'liq gu2011 AQLLI SHAHAR, TEST, 1-мактаб тўгарак жадвал, BUYRUQ. YASIN BREND, TAQRIZ YANGI, 2, Tarjima SPLINES, DIFFERENTIAL EQUATIONS, AND OPTIMAL, (11-ozbetinshe K.U.A)Q.Zafar, APPLIKATSIYADA QIRQISHNI HAR HIL USULLARINI BAJARISH, EDUCATION SYSTEM OF UZBEKISTON, O’zbekistonning va jahon hamjamiyati, OCHILOVA NIGORANING, 7 yosh inqirozi uning sabablari va alomatlari, TEXNIKA MADANIYATI, AAAP
Paillier Encryption and Signature Schemes
Open Problems
A few stealthy packet-dropping attack techniques have
been discovered in recent research, such as the shrew
attack [
] and the jellyfish attack [
]. These attacks do
not drop many packets over a long period. Hence, the
packet-dropping pattern of these attacks is quite similar
to normal packet loss. These attacks can work not only in
TCP connections but also in systems with congestion con-
trol and load control. To counteract these stealthy attacks,
new mechanisms need to be developed to detect such
stealthy attacks and make systems and protocols more
resilient.
Packet-dropping attacks also work cross-layers.
The packets dropped at the network and the transport
layers affect the connectivity of sessions in various appli-
cations [
]. Attackers may also drop some selected packets
to disrupt an ongoing session in an application. Hence, it
is necessary to examine the strategies of such cross-layer
dropping attacks to better protect computer networks and
applications.
Recommended Reading
. Kuzmanovic A, Knightly EW () Low-rate TCP-targeted
denial of service attacks: the shrew vs. the mice and elephants,
Proceedings of ACM SIGCOMM, Karlsruhe, Germany, pp –
. Aad I, Hubaux JP, Knightly E () Denial of service resilience in
ad hoc networks. Proceedings of ACM MobiCom, Philadelphia,
pp –
. Zhang X, Wu SF, Fu Z, Wu TL () Malicious packet dropping:
how it might impact the TCP performance and how we can detect
it. Proceedings of IEEE ICNP, pp –
. Papadimitratos P, Haas ZJ () Secure message transmission in
mobile ad hoc networks. Ad Hoc Networks J ():–
. Buchegger S, Le Boudec J-Y () Performance analysis of
the CONFIDANT protocol (cooperation of nodes – fairness
in dynamic ad hoc networks). Proceedings of ACM MobiHoc,
Philadelphia, pp –
. Shao M, Zhu S, Cao G, La Porta T, Mohapatra P () A cross-
layer dropping attack in video streaming over ad hoc networks.
Proceedings of Securecomm, Istanbul
|
| |