Key establishment protocols for secure mobile communications: a critical survey

被引:5
|
作者
Boyd, C [1 ]
Mathuria, A
机构
[1] Queensland Univ Technol, Sch Data Commun, Informat Secur Res Ctr, Brisbane, Qld 4001, Australia
[2] IBM Res Corp, Tokyo Res Lab, Kanagawa 2420001, Japan
关键词
key management; mobile communications; communications security;
D O I
10.1016/S0140-3664(99)00210-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases refinements are suggested, either to improve the efficiency or to allow simplified security analysis. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:575 / 587
页数:13
相关论文
共 50 条
  • [1] Security flaws in authentication and key establishment protocols for mobile communications
    Shim, K
    Lee, YR
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 62 - 74
  • [2] Key establishment using secure distance bounding protocols
    Singelee, Dave
    Preneel, Bart
    [J]. 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521
  • [3] Secure deniable authenticated key establishment for Internet Protocols
    Lim, Meng-Hui
    Lee, SangGon
    Park, Youngho
    Moon, Sangjae
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 3 - +
  • [4] Accelerating key establishment protocols for mobile communication
    Lee, S
    Hong, SM
    Yoon, H
    Cho, Y
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 51 - 63
  • [5] On session key construction in provably-secure key establishment protocols
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    [J]. PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
  • [6] Secure key distribution protocol in mobile communications
    Yang, Hyungkyu
    An, YoungHwa
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 152 - 155
  • [7] Secure Key Establishment for Device-to-Device Communications
    Shen, Wenlong
    Hong, Weisheng
    Cao, Xianghui
    Yin, Bo
    Shila, Devu Manikantan
    Cheng, Yu
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 336 - 340
  • [8] Key establishment protocols for secure communication in clustered sensor networks
    Poornima, A. S.
    Amberker, B. B.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2013, 11 (02) : 120 - 138
  • [9] Design of secure key establishment protocols: Successes, failures and prospects
    Boyd, C
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 1 - 13
  • [10] A key management architecture and protocols for secure smart grid communications
    Long, Xuelian
    Tipper, David
    Qian, Yi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3602 - 3617