Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

被引:17
|
作者
Lee, Yunho [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun, Suwon 440746, Gyeonggi Do, South Korea
关键词
Authenticated key exchange; Password; Secure token; Identity protection;
D O I
10.1016/j.compeleceng.2009.08.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park's two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park's protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client's identity. In this paper, we propose two protocols require less exchanged messages than Juang's protocols. In addition to this advantage, we point out that the identity protection of Juang's protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:213 / 223
页数:11
相关论文
共 50 条
  • [1] Two efficient two-factor authenticated key exchange protocols in public wireless LANs
    Juang, Wen-Shenq
    Wu, Jing-Lin
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 33 - 40
  • [2] Analysis and Improvement of Two-Factor Authenticated Key Exchange Protocols in Public Wireless LANs
    Ma, Chuangui
    Chen, Shumin
    Cheng, Qingfeng
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [3] An Improved Two-factor Authenticated Key exchange Protocol in Public Wireless LANs
    Singh, Ajit
    Rishi, Rahul
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 226 - 230
  • [4] Two factor authenticated key exchange (TAKE) protocol in public wireless LANs
    Park, YM
    Park, SK
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (05) : 1382 - 1385
  • [5] Improved Two-Factor Authenticated Key Exchange Protocol
    Wu, Shuhua
    Zhu, Yuefei
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2011, 8 (04) : 430 - 439
  • [6] A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption
    Wei, Fushan
    Zhang, Ruijie
    Shen, Jian
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 849 - 855
  • [7] A simple and robust anonymous two-factor authenticated key exchange protocol
    Li, Xiaowei
    Zhang, Yuqing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 711 - 722
  • [8] Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy Rates
    Jiang, Changsong
    Xu, Chunxiang
    Han, Yunxia
    Zhang, Zhao
    Chen, Kefei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3844 - 3856
  • [9] A two-factor authenticated key exchange protocol based on RSA with dynamic passwords
    Wei, Fushan
    Ma, Jianfeng
    Ma, Chuangui
    Li, Xinghua
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 257 - 265
  • [10] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +