over IPsec: the SCTP sessions combine a group of
senders at a group of receivers.
This has two impacts on the tunnel establishment
procedure of IPsec, (Cano, 2011) where:
- The SPD must find a unique SA from a new
type of triplet ({destination address group},
SPI (Security Parameters Index), AH / ESP
(Authentication Headers / Encapsulating
Security Payloads)). So, it is recommended that
the SPD (Security Policy Database) entries are
generalized in the form of groups address
- The protocols of keys exchange/generation of
security associations must assume the
complexity of SCTP. Thus, the work proposed
in (Cano, 2011)
recommends the construction
of a new type ID for ISAKMP: ID_LIST, which
represents a set of identities. However,
using these lists of identities has its own
drawbacks. For example, for IKEv1, a signature
must be linked to a unique identity along all the
same phase. But in the context of SCTP, the
signer is not necessarily the same for each
message. Accordingly, the signatory groups
must share the same key, which involves
security weaknesses in these practices on a
large scale. Moreover, this work proposes an
encoding multiple identities within a single
certificate (for a single public key), but the
support of this feature in the implementation of
certification systems is dubious.
Another disadvantage of the use of SCTP with
IPsec is that each SCTP packet is secured separately
by IPsec. Hence, it increases the overhead when we
have long messages that must be fragmented by
SCTP,because several SCTP packets per message
have to be secured.
Moreovere, there is a lack of efficiency in this
security method that can decrease throughput and
performance of the communication
2.2 SCTP-under-TLS
The use of TLS over SCTP is described in (Bellovin
et al., 2003). TLS is currently mainly used on top of
the TCP. But for TLS over SCTP, one TLS session
must be established per stream. This leads to
performance problems when many streams need to
be secured. Every message is secured separately by
TLS. Then, it is sent over SCTP. In case of sending
many small messages, there will be an increased
overhead compared to a solution that secures a
complete SCTP packet containing several bundled
messages.
2.3 Secure SCTP
To overcome the different problems of using TLS or
IPsec to secure , Secure SCTP integrates
cryptographic functions into SCTP (Jungmaier, A.,
Rescorlaand, E., Tuexen, M., 2002). Like TLS and
IPsec, itprovides authentication, integrity and
confidentiality since it uses the same standard cipher
and HMAC algorithms as these standardized security
solutions.
Nevertheless, SSCTP has a disadvantage
compared to TLS over SCTP. Indeed, when long
messages have to be fragmented at the SCTP layer,
TLS secured firstly the whole message before
fragmenting it. However, SSCTP has to secure each
packet fragmented separately, which adds overhead.
Moreover, SSCTP has to complete a secure session
with messages and news chunks before securing data
transmission, which causes more communication
delay.
2.4 AUTH-SCTP
The extension presented in [4] provides a
mechanism for deriving shared keys for each
association. It defines a new chunk type, several
parameters, and procedures for (SCTP).
Authentication Chunk (AUTH) is the new chunk
type added by this extention, which is used to
authenticate SCTP. Random Parameter (RANDOM),
Chunk List Parameter (CHUNKS)and Requested
HMAC Algorithm Parameter (HMAC-ALGO)are the
new parameters that are used to negotiate the
authentication during association setup and establish
the shared keys. However,authors in this work
didnot definehow shared keys are exchanged.
Another disadvantage of this extention is the
increasing of the complexity of SCTP by adding new
parameters, new chunk and proceduresthat add delay
or degrad the quality of service.
3 SCTPAP SCHEME
In this paper, we propose the secure optimized
authentication for SCTP (SCTPAP) scheme, which
approaches the problem of the security during a
node’s authentication to connect for a first time to
the network. The proposed algorithm uses an
initialization phase to generate and exchange keys
and public parameters recorded when the node wants
access to the network for the first time. When the
node obtains, at the end of this step, a secret key
shared with the authentication server AS, it can
DCNET2014-InternationalConferenceonDataCommunicationNetworking
48