A three-party authenticated key exchange scheme smartcard using elliptic curve cryptosystem for secure key exchange in wireless sensor network

被引:0
|
作者
Yang, Jongwon [1 ]
Seo, Changho [1 ]
Cho, Jinman [2 ]
机构
[1] Kongju Natl Univ, 182 Shinkwan Dong, Kong Ju, Chungnam, South Korea
[2] Elect & Telecommun Res Inst, Div Informat Secur Res, Daejeon, South Korea
关键词
personal information;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
It was subjected of the concern of the researchers in which the security issue of the sensor network is many while the wireless sensor network rose as the ubiquitous computing core technology. Accordingly, many security protocols were proposed And generally these are classified as the protocol of the symmetric key base and protocol of the public key infrastructure. Because of demanding the computation load in which the public key cryptography is excessive, security protocols using the symmetrical key code like SPIN are not appropriate in the sensor network. And an expandability is decreased as the size of a network is enlarged Therefore, presently, many research that it relates to apply the security protocol putting a foundation in the public key to the sensor network is progressing. Presently, it was proposed in the protocols of the public key infrastructure like TinyPK and ECC2.0. The key exchange authenticated with three-party authenticated key exchange protocol, two-party authenticated key exchange protocol the verifier moreover induced from a password is proposed But it is generated in the notable performance degradation and the problems that is weak in the man-in-the-middle attack Moreover, the EKE(Encrypted Key Exchange) technique of the password base is attacked with the password guessing attack, the secret key guess attack of a server, and the message retransmission the password file of a server is attacked. In this paper, the safe communications service was provided to users registered in the identical server. The authenticated key exchange of the password base which uses the smart card in order not to store a password in a server was proposed. And the clustering concept was applied to ECDH(Elliptic Curve Differ-Hellman) key agreement protocol for the shared key setting up between the efficient and safe node. And ECDSA (Elliptic Curve Digital Signature Algorithm) is used in order to use the short stature in comparison with existing digital signature algorithms more and provide the efficient broadcast authentication.
引用
收藏
页码:339 / +
页数:3
相关论文
共 50 条
  • [1] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
    Pu, Qiong
    Zhao, Xiuying
    Ding, Jianmin
    [J]. 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10
  • [2] PROVABLY SECURE HIGH ENTROPY THREE-PARTY AUTHENTICATED KEY EXCHANGE SCHEME FOR NETWORK ENVIRONMENTS
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Huang, Ya-Chieh
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (10): : 5619 - 5630
  • [3] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    [J]. Int. Rev. Comput. Softw, 7 (3633-3638):
  • [4] Provably secure three-party password-authenticated key exchange
    Lin, CL
    Wen, HA
    Hwang, T
    Sun, HM
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (11) : 2990 - 3000
  • [5] A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
    Sinha, Vivek Kumar
    Anand, Divya
    Alharithi, Fahd S.
    Almulihi, Ahmed H.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6293 - 6305
  • [6] Provably Secure Three-Party Authenticated Key Exchange Based on Certificate less Key Encapsulation Sensor Mechanism
    Yang, Junhan
    Cao, Tianjie
    [J]. SENSOR LETTERS, 2013, 11 (11) : 2141 - 2144
  • [7] A PRACTICAL THREE-PARTY AUTHENTICATED KEY EXCHANGE PROTOCOL
    Lo, Nai Wei
    Yeh, Kuo-Hui
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2469 - 2483
  • [8] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho CHOU
    Kuo-yu TSAI
    Tzong-chen WU
    Kuo-hui YEH
    [J]. Frontiers of Information Technology & Electronic Engineering, 2013, 14 (05) : 347 - 355
  • [9] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chih-ho Chou
    Kuo-yu Tsai
    Tzong-chen Wu
    Kuo-hui Yeh
    [J]. Journal of Zhejiang University SCIENCE C, 2013, 14 : 347 - 355
  • [10] Efficient and secure three-party authenticated key exchange protocol for mobile environments
    Chou, Chih-ho
    Tsai, Kuo-yu
    Wu, Tzong-chen
    Yeh, Kuo-hui
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (05): : 347 - 355