Back to Search
Start Over
Duck Attack on Accountable Distributed Systems
- Source :
- 14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, 14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, Nov 2017, Melbourne, Australia. pp.1-8, MobiQuitous, HAL
- Publication Year :
- 2017
- Publisher :
- HAL CCSD, 2017.
-
Abstract
- International audience; Accountability plays a key role in dependable distributed systems.It allows to detect, isolate and churn malicious/selfish nodes thatdeviate from a prescribed protocol. To achieve these properties, sev-eral accountable systems use at their core cryptographic primitivesthat produce non-repudiable evidence of inconsistent or incorrectbehavior.In this paper, we show how selfish and colluding nodes canexploit the use of cryptographic digests in accountability protocolsto mount what we call a duck attack. In a duck attack, selfish andcolluding nodes exploit the use of cryptographic digests to alter thetransmission of messages while masquerading as honest entities.The end result is that their selfish behavior remains undetected. Thisundermines the security guarantees of the accountability protocols.We first discover the duck attack while analyzing PAG — a cus-tom cryptographic protocol to build accountable systems presentedat ICDCS 2016. We later discover that accountable distributed sys-tems based on a secure log (essentially a hash-based data structure)are also vulnerable to the duck attack and apply it on AcTinG — aprotocol presented at SRDS 2014. To defeat our attack, we modifythe underlying secure log to have high-order dependency on themessages stored in it.
- Subjects :
- Cryptographic primitive
Exploit
Computer science
business.industry
Secure log
Distributed computing
Hash function
Duck attack
020206 networking & telecommunications
Cryptography
Public verifiability
02 engineering and technology
Cryptographic protocol
Data structure
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
020204 information systems
0202 electrical engineering, electronic engineering, information engineering
Key (cryptography)
020201 artificial intelligence & image processing
Accountability
business
Protocol (object-oriented programming)
[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Journal :
- 14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, 14th International Conference on Mobile and Ubiquitous Systems: Networks and Services MobiQuitous 2017, Nov 2017, Melbourne, Australia. pp.1-8, MobiQuitous, HAL
- Accession number :
- edsair.doi.dedup.....91bd8a129c00584f8abd6816d16289ff