A security enhanced authentication and key distribution protocol for wireless networks

被引:1
|
作者
Lv, Chao [2 ]
Ma, Maode [1 ]
Li, Hui [2 ]
Ma, Jianfeng [2 ]
Niu, Ben [2 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[2] Xidian Univ, Sch Telecommun Engn, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
authentication protocol; key distribution; formal verification; AVISPA; MOBILE NETWORKS; SESSION KEY;
D O I
10.1002/sec.312
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. Especially, the communication efficiency and security are the critical factors. In this paper, we first analyse the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then, we propose an enhanced AKD protocol to overcome those vulnerabilities with the security functionality to prevent those malicious attacks. Security analysis and formal verification mainly using Automated Validation of Internet Security Protocols and Applications toolkit show that the proposed protocol is secure against those attacks. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:343 / 352
页数:10
相关论文
共 50 条
  • [41] A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks
    Pu, Cong
    Zerkle, Haleigh
    Wall, Andrew
    Lim, Sunho
    Choo, Kim-Kwang Raymond
    Ahmed, Imtiaz
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) : 21136 - 21146
  • [42] A new authentication and key agreement protocol for 5G wireless networks
    Liu, Tian
    Wu, Fan
    Li, Xiong
    Chen, Chaoyang
    TELECOMMUNICATION SYSTEMS, 2021, 78 (03) : 317 - 329
  • [43] Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks
    Mir, Omid
    Munilla, Jorge
    Kumari, Saru
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 79 - 91
  • [44] An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network
    Zhang, Xin
    Wen, Fengtong
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 201 - 215
  • [45] A novel authentication protocol for wireless access security
    Wan C.
    Hu A.
    Zhang J.
    Journal of Convergence Information Technology, 2010, 5 (08) : 22
  • [46] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, Al
    World Academy of Science, Engineering and Technology, 2010, 66 : 643 - 649
  • [47] Authentication protocol for wireless sensor networks
    Gupta, Sunil
    Verma, Harsh Kumar
    Sangal, A.L.
    World Academy of Science, Engineering and Technology, 2010, 42 : 630 - 636
  • [48] Cryptanalysis of an authentication and key distribution protocol
    Tamkang Univ, Taipei, Taiwan
    Commun Lett, 1 (7-8):
  • [49] Cryptanalysis of an authentication and key distribution protocol
    Yen, SM
    IEEE COMMUNICATIONS LETTERS, 1999, 3 (01) : 7 - 8
  • [50] Identifier Based Key Distribution Protocol for Wireless Sensor Networks
    Adeel, Muhammad
    Hussain, Munir
    Beenish, Urooj
    Mehwish, Shenila
    Tokarchuk, Laurissa
    Shahzad, Amer
    2008 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2008, : 167 - +