Moreover, securing this negotiation phase is fundamental: as long as this negotiation is the first step of all the SecMan process, it has to be secure to be sure that the global security architecture is not compromised. Previously, we made a vulnerability analysis of the protocol; we found that several attacks such as Man In the Middle (MITM), replay attacks,
and masquerading are possible. However, this study is out-of-scope of the paper, and we present only the
secure version of the negotiation protocol using an asymmetric cryptographic system based on a Public Key Infrastructure (PKI). In the following description of the protocol, we assume that the PKI exists to check all the credentials (e.g. certificates or public/private keys).
Moreover, securing this negotiation phase is fundamental: as long as this negotiation is the first step of all the SecMan process, it has to be secure to be sure that the global security architecture is not compromised. Previously, we made a vulnerability analysis of the protocol; we found that several attacks such as Man In the Middle (MITM), replay attacks,and masquerading are possible. However, this study is out-of-scope of the paper, and we present only thesecure version of the negotiation protocol using an asymmetric cryptographic system based on a Public Key Infrastructure (PKI). In the following description of the protocol, we assume that the PKI exists to check all the credentials (e.g. certificates or public/private keys).
การแปล กรุณารอสักครู่..
