Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 359-361.

Previous Articles     Next Articles

Improved iSCSI Authentication Based on USB-Key

GUO Yan, LI Yong-tang and LI Chun-jie   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The iSCSI authentication method CHAP was introduced and analyzed,especially its security risks.Cases such as leakage of username and password were considered,and improvement was proposed.Experiments demonstrate that CHAP with USB-key can effectively prevent multi-initiators logging in with same username/password pair,and the security level and stability of iSCSI are significantly improved.

Key words: iSCSI,USB-Key,Network storage

[1] Satran J,Meth K,Sapuntzakis C,et al.Internet Small Computer Systems Interface(iSCSI).IETF RFC 3720,2004.[EB/OL].https://www.ietf.org/rfc/rfc3720.txt
[2] Simpson W.PPP Challenge Handshake Authentication Protocol.IETF RFC 1994,1996.[EB/OL].https://www.ietf.org/rfc/rfc1994.txt
[3] Leduc G.Verification of two versions of the challenge handshake authentication protocol(CHAP)[J].Annales des télé communications.Springer-Verlag,2000,55(1/2):20-30
[4] 朱坷.iSCSI存储系统中的安全性研究[D].上海:上海交通大学,2007
[5] 刘明.基于iSCSI协议的网络存储安全技术研究[D].郑州:中国人民解放军信息工程大学,2007
[6] 陈龙辉.移动PKI体系中SD安全模块的研究[D].北京:北京邮电大学,2008
[7] Vishwakarma S,Bagaria S.iSCSI Simulation Study of Storage System[C]∥Cambridge,UK,Computer Modeling and Simulation,2008,4:703-707
[8] Alaidaros H M,Rasid M F A,Othman M,et al.Enhancing Security Performance with Parallel Crypto Operations in SSL Bulk Data Transfer Phase[C]∥Penang:Telecommunications and Malaysia International Conference on Communications,2007,5:129-133
[9] Aizman A,Yusupov D.Open-iSCSI.http://www.open-is-csi.org/
[10] iSCSI target.http://iscsitarget.sourceforge.net/

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!