Abstract

Port knocking is an access-control technique that consists of revealing a network protected resource only to those users that can prove they know a preshared port sequence. This proving process is done by connecting to the defined ports in the correct order; so, the list gets exposed to the adversaries with access to the connection’s channel. We propose a newfangled technique for protecting this process, avoiding eavesdroppers to get a long-live valid sequence. Our method is based on TOTP codes and has been designed thinking on making it the most usable as possible. There has been designed two different approaches, but we demonstrate that the most simple of them is far enough robust, while it remains to be very usable. This technique is especially suitable for enhancing the resilience of network services against local network adversaries.

Highlights

  • In a worldwide connected network, where almost all servers have to be remotely administrated, access control has become a crucial task in data protection

  • The hardening of SSH service has been widely addressed by the security experts, concluding that network segmentation and packet filtering in earlier network stages could be the most effective approaches for it

  • Port knocking is an inexpensive protection technique that consists of denying the connection to a targeted port until a preshared set of ports has not been “knocked” in a certain order

Read more

Summary

Introduction

In a worldwide connected network, where almost all servers have to be remotely administrated, access control has become a crucial task in data protection. This is the case of some IoT (Internet of things) devices that may not have enough capabilities for creating an isolated network (just for themselves) If they can filter incoming connections, it can detect a port knocking sequence. As IoT devices that are implemented in low resource hardware, developers have to optimize their power consumption, and they are deployed without implementing any security control [6] This leverages to a highrisk scenario for information security, where the most common threaths are signal jamming attacks and replay attacks [6]. As IoT is widely implemented using common mobile technologies (e.g., Android, and Raspberry PI), both attacks (i.e., signal jamming and replay attacks) can be performed using wellknown techniques.

Background
Discussion
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.