Design of Authentication Protocols Preventing Replay Attacks

被引:1
|
作者
Li, Junhong [1 ]
机构
[1] Hebei Normal Univ, Coll Math & Informat Sci, Shijiazhuang 050016, Peoples R China
关键词
replay attack; authentication; formal analysis; key distribution protocol;
D O I
10.1109/FBIE.2009.5405842
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Replaying attack is a typical issue which designing authentication and key distribution protocols is facing. In this article, based on studying flaws in authentication protocols, we analyze the reasons from designing protocols, then present principles of preventing replaying, finally we provide a new authentication and key distribution protocol corresponding to the principles.
引用
收藏
页码:362 / 365
页数:4
相关论文
共 50 条
  • [1] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [2] Permutation-Based Biometric Authentication Protocols for Mitigating Replay Attacks
    Shelton, Joseph
    Dozier, Gerry
    Adams, Joshua
    Alford, Aniesha
    [J]. 2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [3] Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
    Pietrzak, Krzysztof
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 3 - 15
  • [4] Replay tolerance of authentication protocols
    Lam, KY
    [J]. COMPUTER COMMUNICATIONS, 1995, 18 (12) : 988 - 992
  • [5] Design guidelines for security protocols to prevent replay & parallel session attacks
    Jurcut, Anca D.
    Coffey, Toni
    Dojen, Reiner
    [J]. COMPUTERS & SECURITY, 2014, 45 : 255 - 273
  • [6] Validating attacks on authentication protocols
    Hagalisletto, Anders Moen
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 362 - 369
  • [7] A bound on attacks on authentication protocols
    Stoller, SD
    [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
  • [8] Errors in attacks on authentication protocols
    Hagalisletto, Anders Moen
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 223 - 229
  • [9] Preventing Replay Attacks on Speaker Verification Systems
    Villalba, Jesus
    Lleida, Eduardo
    [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
  • [10] Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs
    Di Mauro, Alessio
    Fafoutis, Xenofon
    Modersheim, Sebastian
    Dragoni, Nicola
    [J]. SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 1 - 16