%0 Conference Proceedings %T Secure Client Puzzles Based on Random Beacons %+ Computer Science [Heinrich Heine University] %A Jerschow, Yves, Igor %A Mauve, Martin %Z Part 4: Security %< avec comité de lecture %( Lecture Notes in Computer Science %B 11th International Networking Conference (NETWORKING) %C Prague, Czech Republic %Y Robert Bestak %Y Lukas Kencl %Y Li Erran Li %Y Joerg Widmer %Y Hao Yin %I Springer %3 NETWORKING 2012 %V LNCS-7290 %N Part II %P 184-197 %8 2012-05-21 %D 2012 %R 10.1007/978-3-642-30054-7_15 %K network security %K Denial of Service (DoS) %K client puzzles %K authentication %K public key cryptography %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets. A well-known countermeasure against resource depletion attacks are client puzzles.Most existing client puzzle schemes are interactive. Upon receiving a request the server constructs a puzzle and asks the client to solve this challenge before processing its request. But the packet with the puzzle parameters sent from server to client lacks authentication. The attacker might mount a counterattack on the clients by injecting faked packets with bogus puzzle parameters bearing the server’s sender address. A client receiving a plethora of bogus challenges may become overloaded and probably will not be able to solve the genuine challenge issued by the authentic server. Thus, its request remains unanswered. In this paper we introduce a secure client puzzle architecture that overcomes the described authentication issue. In our scheme client puzzles are employed noninteractively and constructed by the client from a periodically changing, secure random beacon. A special beacon server broadcasts beacon messages which can be easily verified by matching their hash values against a list of beacon fingerprints that has been obtained in advance. We develop sophisticated techniques to provide a robust beacon service. This involves synchronization aspects and especially the secure deployment of beacon fingerprints. %G English %Z TC 6 %2 https://inria.hal.science/hal-01531977/document %2 https://inria.hal.science/hal-01531977/file/978-3-642-30054-7_15_Chapter.pdf %L hal-01531977 %U https://inria.hal.science/hal-01531977 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC6 %~ IFIP-LNCS-7290 %~ IFIP-NETWORKING