Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243791
|View full text |Cite
|
Sign up to set email alerts
|

Secure Opportunistic Multipath Key Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…Costea et al 27 discuss a threat model for 2‐path based on the attacker's actions (active and passive) and their information‐sharing nature (synchronized and unsynchronized) as depicted in Figure 5. This model has various possible scenarios by considering all possible combinations of attackers for the 2‐Path case: true˜scriptP/true˜scriptP, true˜scriptPtrue˜scriptP, true˜scriptA/true˜scriptP, true˜scriptAtrue˜scriptP, true˜scriptA/true˜scriptA, and true˜scriptAtrue˜scriptA.…”
Section: Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…Costea et al 27 discuss a threat model for 2‐path based on the attacker's actions (active and passive) and their information‐sharing nature (synchronized and unsynchronized) as depicted in Figure 5. This model has various possible scenarios by considering all possible combinations of attackers for the 2‐Path case: true˜scriptP/true˜scriptP, true˜scriptPtrue˜scriptP, true˜scriptA/true˜scriptP, true˜scriptAtrue˜scriptP, true˜scriptA/true˜scriptA, and true˜scriptAtrue˜scriptA.…”
Section: Threat Modelmentioning
confidence: 99%
“…Since the MPTCP uses multiple paths, it opens many doors to an adversary get into its session. Articles 27,28 discuss about various attacks that are possible in MPTCP such as man‐in‐the‐middle (MM), denial‐of‐service (DoS), and SYN‐flooding attacks. To perform these attacks, an adversary needs some information about the MPTCP user such as IP address, flow‐sequence number, and session key.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations