On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access

被引:0
|
作者
Jiang, J [1 ]
He, C [1 ]
Jiang, LG [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Modern Commun, Shanghai 200030, Peoples R China
来源
NETWORKING AND MOBILE COMPUTING, PROCEEDINGS | 2005年 / 3619卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Heavily based on the provable security model of Canetti and Krawczyk (CK-model), an identity-based authentication and key exchange (AKE) protocol which uses pairings is proposed for securing heterogeneous wireless access in this paper. By using the CK-model approach, an ideal and secure key exchange protocol was first proposed. Then a full-fledged authenticator is built to provide authentication of the ideal protocol. This completes a practical AKE protocol for heterogeneous environment while carrying the security proof. Analysis shows that our protocol is secure with partial forward secrecy, and efficient for considering the asymmetric wireless environment.
引用
收藏
页码:972 / 981
页数:10
相关论文
共 50 条
  • [31] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [32] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [33] A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication
    Zhong Yantao
    Ma Jianfeng
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2010, 12 (06) : 592 - 599
  • [34] A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
    Zhang, Ke
    Xu, Kai
    Wei, Fushan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [35] A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network
    Kumar, Mahender
    Chand, Satish
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2779 - 2786
  • [36] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [37] PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments
    Islam, S. K. Hafizul
    Parai, Krittibas
    Gupta, Daya Sagar
    COMPUTER NETWORKS, 2024, 238
  • [38] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741
  • [39] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [40] A resilient identity-based authenticated key exchange protocol
    Elashry, Ibrahim
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2279 - 2290