Security flaws in authentication and key establishment protocols for mobile communications

被引:3
|
作者
Shim, K [1 ]
Lee, YR [1 ]
机构
[1] Ewha Womans Univ, Dept Math, Seoul 120750, South Korea
关键词
key establishment protocol; mutual authentication; known key-share attack; unknown key-share attack; denial-of-service attack;
D O I
10.1016/j.amc.2004.10.044
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Mobile electronic commerce has started recently to appear in the scene by exploiting the advantages of mobile computing and telecommunications in order to provide a large number of advanced services to mobile users. A variety of protocols suitable for applications in upcoming third-generation mobile systems such as UMTS have been proposed. In this paper, we identify security flaws with several authentication and key establishment protocols for mobile communications introducing a new kind of attack: known key-share attack. Our results show that the protocols do not provide authentication as intended. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:62 / 74
页数:13
相关论文
共 50 条
  • [41] A Study of Authentication Protocols for Security of Mobile RFID (M-RFID) System
    Noor, Noriani Mohammed
    Kamardin, Kamilia
    Sam, Suriani Mohd
    Abas, Hafiza
    Sjarif, Nilam Nur Amir
    Yusof, Yusnaidi Md
    Azmi, Azri
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, ELECTRONIC AND SYSTEMS ENGINEERING (ICAEES), 2016, : 339 - 343
  • [42] Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
    Jiang, Yixin
    Lin, Chuang
    Shen, Xuemin
    Shi, Minghui
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) : 2569 - 2577
  • [43] Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
    Sun, Da-Zhi
    Tian, Yangguang
    [J]. MATHEMATICS, 2022, 10 (22)
  • [44] Security of Analysis Mutual Authentication And Key Exchange for Low Power Wireless Communications
    Liu, Chenglian
    Chen, Sisheng
    Sun, Shuliang
    [J]. 2012 INTERNATIONAL CONFERENCE ON FUTURE ELECTRICAL POWER AND ENERGY SYSTEM, PT A, 2012, 17 : 644 - 649
  • [45] Anonymous authentication protocols with credit-based chargeability and fair privacy for mobile communications
    Fan, Chun-, I
    Huang, Vincent Shi-Ming
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 412 - +
  • [46] Multimedia security in group communications: recent progress in key management, authentication, and watermarking
    Ahmet M. Eskicioglu
    [J]. Multimedia Systems, 2003, 9 : 239 - 248
  • [47] Multimedia security in group communications: recent progress in key management, authentication, and watermarking
    Eskicioglu, AM
    [J]. MULTIMEDIA SYSTEMS, 2003, 9 (03) : 239 - 248
  • [48] A heterogeneous user authentication and key establishment for mobile client-server environment
    Li, Fagen
    Wang, Jiye
    Zhou, Yuyang
    Jin, Chunhua
    Islam, S. K. Hafizul
    [J]. WIRELESS NETWORKS, 2020, 26 (02) : 913 - 924
  • [49] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [50] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +