Design of Authentication Protocols Preventing Replay Attacks

被引:1
|
作者
Li, Junhong [1 ]
机构
[1] Hebei Normal Univ, Coll Math & Informat Sci, Shijiazhuang 050016, Peoples R China
关键词
replay attack; authentication; formal analysis; key distribution protocol;
D O I
10.1109/FBIE.2009.5405842
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Replaying attack is a typical issue which designing authentication and key distribution protocols is facing. In this article, based on studying flaws in authentication protocols, we analyze the reasons from designing protocols, then present principles of preventing replaying, finally we provide a new authentication and key distribution protocol corresponding to the principles.
引用
收藏
页码:362 / 365
页数:4
相关论文
共 50 条
  • [21] A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
    Lopez Pimentel, Juan Carlos
    Monroy, Raul
    Hutter, Dieter
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 174 (04) : 117 - 130
  • [22] Modified RAP-WOTA for Preventing Man in the Middle and Replay Attacks
    Syafrilah, Zianita
    Permana, Anang Adi
    Handayani, Annisa Dini
    [J]. 2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 73 - 78
  • [23] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [24] Grobner Basis Attacks on Lightweight RFID Authentication Protocols
    Han, Daewan
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (04): : 691 - 706
  • [25] 2 ATTACKS ON NEUMAN-STUBBLEBINE AUTHENTICATION PROTOCOLS
    HWANG, TL
    LEE, NY
    LI, CM
    KO, MY
    CHEN, YH
    [J]. INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 103 - 107
  • [26] ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX
    Wang Shaohui
    Liu Sujuan
    [J]. Journal of Electronics(China), 2013, 30 (01) : 33 - 39
  • [27] Discovering man-in-the-middle attacks in authentication protocols
    Guha, Ratan K.
    Furqan, Zeeshan
    Muhammad, Shahabuddin
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3654 - 3660
  • [28] Preventing UDP Flooding Amplification Attacks with Weak Authentication
    Biagioni, Edoardo
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 78 - 82
  • [29] Operation Code Authentication Preventing Shoulder Surfing Attacks
    Naqvi, Syed Shabih ul Hasan
    Afzal, Samiullah
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 32 - 35
  • [30] Preventing Wormhole Attacks Using Physical Layer Authentication
    Jain, Shalabh
    Baras, John S.
    [J]. 2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,