Enhanced mutual authentication and key exchange protocol for wireless communications

被引:0
|
作者
He, Yi-Jun [1 ]
Lee, Moon-Chuen [1 ]
Li, Jie [2 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Peoples R China
[2] Cent S Univ, Sch Informat Sci & Engn, Changsha 410075, Hunan, Peoples R China
关键词
MAKEP; elliptic curve; forward secrecy; user anonymity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze several mutual authentication and key exchange protocols (MAKEPs) in this paper, and present a number of desirable properties of such protocols for secure wireless communications. To address the security problems of existing protocols, we propose an improved version of MAKEP known as EC-MAKEP. Apart from providing the desired security features supported by the existing protocols, the proposed protocol supports user anonymity, and forward secrecy which are not supported by many of the previously proposed protocols. Further, the proposed protocol outperforms ES-MAKEP, the latest improved version of MAKEP, in terms of computation cost and communication bandwidth.
引用
收藏
页码:348 / +
页数:2
相关论文
共 50 条
  • [1] A secure key exchange and mutual authentication protocol for wireless mobile communications
    He Yijun
    Xu Nan
    Li Jie
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 558 - +
  • [2] Mutual authentication and key exchange for low power wireless communications
    Wong, DS
    Chan, AH
    [J]. 2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 39 - 43
  • [3] Towards a Secure Mutual Authentication and Key Exchange Protocol for Mobile Communications
    He, Yijun
    Lee, Moon-Chuen
    [J]. 2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 216 - 222
  • [4] Cryptanalysis of the mutual authentication and key agreement protocol with smart cards for wireless communications
    Chiou, Shu-Fen
    Pan, Hsieh-Tsen
    Cahyadi, Eko Fajar
    Hwang, Min-Shiang
    [J]. International Journal of Network Security, 2019, 21 (01) : 100 - 104
  • [5] The study of mutual authentication and key exchange protocols for low power wireless communications
    Yan Lili
    Peng Daiyuan
    Gao Yuexiang
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [6] Cryptanalysis of mutual authentication and key exchange for low-power wireless communications
    Shim, K
    [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (05) : 248 - 250
  • [7] Security of Analysis Mutual Authentication And Key Exchange for Low Power Wireless Communications
    Liu, Chenglian
    Chen, Sisheng
    Sun, Shuliang
    [J]. 2012 INTERNATIONAL CONFERENCE ON FUTURE ELECTRICAL POWER AND ENERGY SYSTEM, PT A, 2012, 17 : 644 - 649
  • [8] Comments on mutual authentication and key exchange protocols for low power wireless communications
    Ng, SL
    Mitchell, C
    [J]. IEEE COMMUNICATIONS LETTERS, 2004, 8 (04) : 262 - 263
  • [9] A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
    蒋军
    何晨
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2005, (05) : 399 - 404
  • [10] Novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
    Jiang J.
    He C.
    [J]. Journal of Zhejiang University-SCIENCE A, 2005, 6 (5): : 399 - 404