[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: About the HIP security model (was Re: New multi6 draft: WIMP)
>> the incentive to use such schemes? Although, crypto puzzles work
>> against intruders, are we not penalizing a legitimate user by asking
>> him to waste his CPU cycle?
>
> In other words, you raise the bar for DoS attackers, by slightly
> penalizing legitimate users.
IMO, HIP is a great choice for mobility/wireless scenarios( otoh, it has
to depend on something else for providing reliability.) But, one cannot
expect a PDA/mobile device to burn cycles for solving the puzzle. In a
wired-cum-wireless case, wired nodes are better placed than wireless
nodes ( wrt CPU cycles.) Also, imagine a scenario where an attacker has
high CPU power and a legitimate user on a low end system. So, I would
expect the puzzle to vary depending on the CPU power (i.e. if high CPU
power...it should solve fast.) I did see a work by MSR Penny Black folks
addressing this aspect.
>> btw, is their any standardized RFC supporting weak authentication
>> methods?
>
> My understanding of "weak" authentication is that the whole
> area is pretty new. In fact, it looks like that we launched
> the term in our paper a couple of years ago:
The term is introduced by your paper. But, it is pretty common to see
research works in ad-hoc networks using weak authentication scheme.
e.g., Ross Anderson's Resurrecting Duckling model. But, i agree, the
security protocol 2002 survey paper is the widely cited one. I was
just curious to know about IETF related works using weak authentication.
thanks to both you and jari for the detailed replies.
I would respond for the remaining parts of the mail after reading the
HIP arch draft.