Skip to main content
Erschienen in: International Journal of Information Security 4/2014

01.08.2014 | Regular Contribution

Enhancing security of cookie-based sessions in mobile networks using sparse caching

verfasst von: Amerah Alabrah, Jeffrey Cashion, Mostafa Bassiouni

Erschienen in: International Journal of Information Security | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The exponential growth in the use of mobile phones and tablets to gain wireless access to the Internet has been accompanied by a similar growth in cyber attacks over wireless links to steal session cookies and compromise private users’ accounts. The popular one-way hash chain authentication technique in its conventional format is not optimal for mobile phones and other handheld devices due to its high computational overhead. In this paper, we propose and evaluate the use of sparse caching techniques to reduce the overhead of one-way hash chain authentication. Sparse caching schemes with uniform spacing, non-uniform spacing and geometric spacing are designed and analyzed. A Weighted Overhead formula is used to obtain insight into the suitable cache size for different classes of mobile devices. Additionally, the scheme is evaluated from an energy consumption perspective. We show that sparse caching can also be effective in the case of uncertainty in the number of transactions per user session. Our extensive performance tests have shown the significant improvement achieved by the sparse caching schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, J., Jiang, M., Liu, Y.: Wireless LAN security and IEEE 802.11i. IEEE Wirel. Commun. 12(1), 27–36 (2005)CrossRef Chen, J., Jiang, M., Liu, Y.: Wireless LAN security and IEEE 802.11i. IEEE Wirel. Commun. 12(1), 27–36 (2005)CrossRef
2.
Zurück zum Zitat Sreedhar, C., Madhusudhana, S., Kasiviswanath, N.: A survey on security issues in wireless ad hoc network routing protocols. Int. J. Comp. Sci. Eng. 12(2), 224–232 (2010) Sreedhar, C., Madhusudhana, S., Kasiviswanath, N.: A survey on security issues in wireless ad hoc network routing protocols. Int. J. Comp. Sci. Eng. 12(2), 224–232 (2010)
3.
Zurück zum Zitat Siddiqui, M., Hong, C.: Security issues in wireless mesh networks. In: Proceedings of IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE’07). Seoul, Korea (2007) Siddiqui, M., Hong, C.: Security issues in wireless mesh networks. In: Proceedings of IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE’07). Seoul, Korea (2007)
4.
Zurück zum Zitat Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. 10(3), 6–28 (2008)CrossRef Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. 10(3), 6–28 (2008)CrossRef
7.
Zurück zum Zitat Riley, R., Ali, N., Al-Senaidi, K., Al-Kuwari, A.: Empowering users against sidejacking attacks. In: Proceedings of the ACM SIGCOMM Conference on SIGCOMM. New Delhi, India (2010) Riley, R., Ali, N., Al-Senaidi, K., Al-Kuwari, A.: Empowering users against sidejacking attacks. In: Proceedings of the ACM SIGCOMM Conference on SIGCOMM. New Delhi, India (2010)
8.
Zurück zum Zitat Liu, A., Kovacs, J., Huang, C., Gouda, M.: A secure cookie protocol. In: Proceedings of 14th International Conference on Computer Communications and Networks (2005) Liu, A., Kovacs, J., Huang, C., Gouda, M.: A secure cookie protocol. In: Proceedings of 14th International Conference on Computer Communications and Networks (2005)
9.
10.
Zurück zum Zitat Zhang, Y., Fang, Y.: ARSA: an attack-resilient security architecture for multihop wireless mesh networks. IEEE J. Sel. Areas Commun. 24(10), 1916–1928 (2006)CrossRefMathSciNet Zhang, Y., Fang, Y.: ARSA: an attack-resilient security architecture for multihop wireless mesh networks. IEEE J. Sel. Areas Commun. 24(10), 1916–1928 (2006)CrossRefMathSciNet
11.
Zurück zum Zitat Hu, Y., Perrig, A., Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1–2), 21–38 (2005)CrossRef Hu, Y., Perrig, A., Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1–2), 21–38 (2005)CrossRef
12.
Zurück zum Zitat Hu, Y., Johnson, D., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pp. 3–13. Calicoon, NY (2002) Hu, Y., Johnson, D., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pp. 3–13. Calicoon, NY (2002)
14.
Zurück zum Zitat Cashion, J., Bassiouni, M.: Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code. In: Proceedings of the 7th ACM International Symposium on QoS and Security of Wireless and Mobile Networks (Q2SWinet’11), pp. 21–26. Miami Beach, Florida (2011) Cashion, J., Bassiouni, M.: Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code. In: Proceedings of the 7th ACM International Symposium on QoS and Security of Wireless and Mobile Networks (Q2SWinet’11), pp. 21–26. Miami Beach, Florida (2011)
15.
Zurück zum Zitat Liu, D., Ning, P.: Multilevel \(\mu \)TESLA: broadcast authentication for distributed sensor networks. Trans. Embed. Comput. Syst. (TECS) 3(40) (2004) Liu, D., Ning, P.: Multilevel \(\mu \)TESLA: broadcast authentication for distributed sensor networks. Trans. Embed. Comput. Syst. (TECS) 3(40) (2004)
16.
Zurück zum Zitat Tan, H., Jha, S., Ostry, D., Zic, J., Sivaraman, V.: Secure multi-hop network programming with multiple one-way key chains. In: Proceedings of the First ACM Conference on Wireless Network Security-WiSec ’08 (2008) Tan, H., Jha, S., Ostry, D., Zic, J., Sivaraman, V.: Secure multi-hop network programming with multiple one-way key chains. In: Proceedings of the First ACM Conference on Wireless Network Security-WiSec ’08 (2008)
17.
Zurück zum Zitat Khalil, I., Bagchi, S., Rotaru, C.N., Shroff, N.B.: UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. 8(2), 148–164 (2010)CrossRef Khalil, I., Bagchi, S., Rotaru, C.N., Shroff, N.B.: UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. 8(2), 148–164 (2010)CrossRef
18.
Zurück zum Zitat Li, M., Yu, S., Guttman, J.D., Lou, W., Ren, K.: Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. (TOSN) 9(2), 18 (2013) Li, M., Yu, S., Guttman, J.D., Lou, W., Ren, K.: Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. (TOSN) 9(2), 18 (2013)
19.
Zurück zum Zitat Chen, T.H., Hsiang, H.C., Shih, W.K.: Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Gener. Comput. Syst. 27(4), 377–380 (2011) Chen, T.H., Hsiang, H.C., Shih, W.K.: Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Gener. Comput. Syst. 27(4), 377–380 (2011)
20.
Zurück zum Zitat Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J Netw. Comput. Appl. 33(1), 1–5 (2010)CrossRef Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J Netw. Comput. Appl. 33(1), 1–5 (2010)CrossRef
21.
Zurück zum Zitat Dai, X., Grundy, J.: NetPay: an off-line, decentralized micro-payment system for thin-client applications. Electron. Commer. Res. Appl. 6(1), 91–101 (2007)CrossRef Dai, X., Grundy, J.: NetPay: an off-line, decentralized micro-payment system for thin-client applications. Electron. Commer. Res. Appl. 6(1), 91–101 (2007)CrossRef
22.
Zurück zum Zitat Liaw, H., Lin, J., Wu, W.: A new electronic traveler’s check scheme based on one-way hash function. Electron. Commer. Res. Appl. 6(4), 499–508 (2008)CrossRef Liaw, H., Lin, J., Wu, W.: A new electronic traveler’s check scheme based on one-way hash function. Electron. Commer. Res. Appl. 6(4), 499–508 (2008)CrossRef
23.
Zurück zum Zitat Gupta, A., Weber, W., Mowry, T.: Reducing Memory and Traffic Requirements for Scalable Directory-based Cache Coherence Schemes. Springer, NY (1992) Gupta, A., Weber, W., Mowry, T.: Reducing Memory and Traffic Requirements for Scalable Directory-based Cache Coherence Schemes. Springer, NY (1992)
24.
Zurück zum Zitat Deftu, A., Murarasu, A.: Optimization techniques for dimensionally truncated sparse grids on heterogeneous systems. In: Proceedings of the 21st Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 351–358 (2013) Deftu, A., Murarasu, A.: Optimization techniques for dimensionally truncated sparse grids on heterogeneous systems. In: Proceedings of the 21st Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 351–358 (2013)
25.
Zurück zum Zitat Lau, W., Kumar, M., Venkatesh, S.: A cooperative cache architecture in support of caching multimedia objects in MANETs. In: Proceedings of the 5th ACM International Workshop on Wireless Mobile Multimedia, pp. 56–63 (2002) Lau, W., Kumar, M., Venkatesh, S.: A cooperative cache architecture in support of caching multimedia objects in MANETs. In: Proceedings of the 5th ACM International Workshop on Wireless Mobile Multimedia, pp. 56–63 (2002)
26.
Zurück zum Zitat Douglas, C. C., Hu, J., Iskandarani, M., Kowarschik, M., Rüde, U., Weiss, C.: Maximizing cache memory usage for multigrid algorithms. In: Chen, Z., et al. (eds.) Multiphase Flows and Transport in Porous Media: State of the Art. Lecture Notes in Physics, vol. 552, pp. 124–137. Springer, Berlin (2000) Douglas, C. C., Hu, J., Iskandarani, M., Kowarschik, M., Rüde, U., Weiss, C.: Maximizing cache memory usage for multigrid algorithms. In: Chen, Z., et al. (eds.) Multiphase Flows and Transport in Porous Media: State of the Art. Lecture Notes in Physics, vol. 552, pp. 124–137. Springer, Berlin (2000)
27.
Zurück zum Zitat Hu, Y., Jakobsson, M., Perrig, A.: Efficient constructions for one-way hash chains. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3531, pp. 423–441. Springer, Berlin (2005) Hu, Y., Jakobsson, M., Perrig, A.: Efficient constructions for one-way hash chains. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3531, pp. 423–441. Springer, Berlin (2005)
28.
Zurück zum Zitat Chandramouli, R., Bapatla, S., Subbalakshmi, K., Uma, R.: Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(2), 162–180 (2006)CrossRef Chandramouli, R., Bapatla, S., Subbalakshmi, K., Uma, R.: Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(2), 162–180 (2006)CrossRef
29.
Zurück zum Zitat Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: Analyzing the energy consumption of security protocols. In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, pp. 30–35 (2003) Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: Analyzing the energy consumption of security protocols. In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, pp. 30–35 (2003)
Metadaten
Titel
Enhancing security of cookie-based sessions in mobile networks using sparse caching
verfasst von
Amerah Alabrah
Jeffrey Cashion
Mostafa Bassiouni
Publikationsdatum
01.08.2014
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 4/2014
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-013-0223-8

Weitere Artikel der Ausgabe 4/2014

International Journal of Information Security 4/2014 Zur Ausgabe