Universal Session Protocol: A Novel Approach to Session Management

06/25/2023
by   Jonathon Anderson, et al.
0

Currently, the TCP/IP model enables exploitation of vulnerabilities anonymously by unconditionally fulfilling every request for a connection into an application; the model only incorporates authentication within applications themselves, rather than as a precondition for access into applications. I am proposing the Universal Session Protocol as a change to the architecture of the TCP/IP model to include a session layer featuring a structured generalized process for authentication negotiation and fulfillment. The Universal Session Protocol addresses an urgent and vital need to eliminate unauthenticated data processing on security critical systems. Previous work regarding TCP/IP security has focused on the application design and implementation and existing protocol layers, but has failed to posit the addition of a session layer as a mitigating control. Failing to implement a distinct authentication layer leaves every resource connected to the global Internet, including life and security critical infrastructure, vulnerable to attacks from anonymous and untraceable sources. The Universal Session Protocol provides a solution by establishing a TCP/IP Session Layer that explicitly provides authentication before a data stream is accessible within an application. After authentication, an identity is associated with the data stream so that all data may be related back to that identity for forensic purposes. If authentication fails, the application will never process user data, rendering the service safe from anonymous bad actors.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/01/2022

A Framework for Server Authentication using Communication Protocol Dialects

In today's world, computer networks have become vulnerable to numerous a...
research
03/27/2023

Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE

Automotive softwarization is progressing and future cars are expected to...
research
03/31/2019

How to Authenticate MQTT Sessions Without Channel- and Broker Security

This paper describes a new but state-of-the-art approach to provide auth...
research
09/21/2023

De-authentication using Ambient Light Sensor

While user authentication happens before initiating or resuming a login ...
research
04/06/2022

Transport Layer Networking

In this paper we focus on the invention of new network forwarding behavi...
research
11/07/2017

AppSwitch: Resolving the Application Identity Crisis

Networked applications traditionally derive their identity from the iden...
research
08/26/2019

Integration of the Captive Portal paradigm with the 802.1X architecture

In a scenario where hotspot wireless networks are increasingly being use...

Please sign up or login with your details

Forgot password? Click here to reset