Preventing single sign-on impersonation attacks with a keyless signature scheme

Amerah A. Alabrah, M. Bassiouni
{"title":"Preventing single sign-on impersonation attacks with a keyless signature scheme","authors":"Amerah A. Alabrah, M. Bassiouni","doi":"10.1109/WMNC.2017.8248852","DOIUrl":null,"url":null,"abstract":"The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WMNC.2017.8248852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The mutli-server environment of many Internet services available today such as Google, and the availability of Single Sign-On (SSO) solutions have brought about promising technologies. Many of these and similar applications provide clients with the ability sign on using one set of username and password alleviating the need of multiple identities and multiple password. Although promising, SSO mechanisms need to be extra robust and provide utmost authentication for their users. Due to the unidirectional nature of the authentication channel between the service provider and the client in SSO and the lack of a recent authentication key, researchers have pointed out vulnerabilities in such schemes leading to attacks such as impersonation attacks. In this paper, we present a keyless signature scheme that remedies the aforementioned problem. By utilizing a combination of a Merkle hash tree and a hash calendar, the identity provider in SSO periodically creates an authentication key used by the client and the service provider. Traffic between the latter two is secured by a one-way hash chain to achieve bidirectional authentication. The proposed scheme is evaluated by simulation experiments and communication and computation costs are employed for evaluation. The optimal length of the one-way hash chain between the service providers and the client is validated analytically.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用无密钥签名方案防止单点登录模拟攻击
目前许多Internet服务(如b谷歌)的多服务器环境以及单点登录(SSO)解决方案的可用性带来了有前途的技术。许多这样的应用程序和类似的应用程序为客户机提供了使用一组用户名和密码登录的功能,从而减轻了使用多个身份和多个密码的需要。尽管很有前途,但SSO机制需要非常健壮,并为用户提供最大程度的身份验证。由于单点登录中服务提供者和客户端之间的身份验证通道是单向的,并且缺乏最新的身份验证密钥,研究人员指出了这种方案存在的漏洞,导致了冒充攻击等攻击。在本文中,我们提出了一种解决上述问题的无密钥签名方案。通过使用Merkle散列树和散列日历的组合,SSO中的身份提供者可以定期创建客户端和服务提供者使用的身份验证密钥。后两者之间的通信由单向散列链保护,以实现双向身份验证。通过仿真实验对该方案进行了评价,并采用通信和计算代价进行了评价。分析验证了服务提供者和客户端之间的单向散列链的最佳长度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cover page Real time traffic density aware road based forwarding method for vehicular ad hoc networks Reputation-aware energy-efficient solution for FANET monitoring Secure algorithms for SAKA protocol in the GSM network Hybrid power control for multi-carrier systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1