Skip to main content

Efficient Design for Secure Multipath TCP against Eavesdropper in Initial Handshake
draft-kim-mptcp-semptcp-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Dongyong Kim
Last updated 2017-04-27 (Latest revision 2016-10-24)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Multipath TCP has become the transmission technique of choice for the multi-homed environment. Recently, there have been multiple attempts to verify the security of Multipath TCP; but an eavesdropper in the initial handshake breaches the primary security goal of Multipath TCP. In this paper, we introduce a secure scheme against an initial eavesdropper, using asymmetric key exchange. We optimize the public parameters to overcome two challenges to the use of asymmetric cryptography. Then we show that compared to previously proposed methods, our scheme has low overhead, and is more secure. Our approach applies to many weak authentication-based protocols that seek to use asymmetric cryptography.

Authors

Dongyong Kim

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)