An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security

被引:0
|
作者
Azim, MA [1 ]
Jamalipour, A [1 ]
机构
[1] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Failure of the wired equivalent privacy (WEP) protocol largely stimulated the research and development of a security protocols for wireless local area networks. Industry alliances and IEEE responded with Wi-Fi Protected Access (WPA) and IEEE 802.11i for the solutions to the aforementioned problem. This paper proposes a mutually authenticated key agreement protocol that employs elliptic curve digital signature algorithm (ECDSA) and elliptic curve Diffie-Hellman (ECDH) exchange intended for mutual authentication and key exchange respectively. To support both the basic service set (BSS) network and extended service set (ESS) network two different versions of the protocol have also been derived from the original one. The design objective was the efficiency and compatibility to 802.11i standard.
引用
收藏
页码:376 / 380
页数:5
相关论文
共 50 条
  • [1] An elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 767 - 777
  • [2] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [3] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
    Lu, Yanrong
    Zhao, Dawei
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2022, 19 (01) : 66 - 85
  • [4] An Authenticated Constant Round Group Key Agreement Protocol Based on Elliptic Curve Cryptography
    Zhu Liehuang
    Liao Lejian
    Li Wenzhuo
    Zhang Zijian
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 131 - 134
  • [5] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [6] Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography
    Nimbhorkar, Sonali
    Malik, Latesh
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 824 - 830
  • [7] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
  • [8] ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD
    Lucas C.K. Hui
    K.P. Chow
    [J]. Journal of Electronics(China), 2005, (03) : 268 - 272
  • [9] ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD
    Lucas C.K. Hui
    K.P. Chow
    [J]. JournalofElectronics., 2005, (03) - 272
  • [10] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
    Nimbhorkar, S. U.
    Malik, L. G.
    [J]. 2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135