Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

被引:17
|
作者
Lee, Yunho [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun, Suwon 440746, Gyeonggi Do, South Korea
关键词
Authenticated key exchange; Password; Secure token; Identity protection;
D O I
10.1016/j.compeleceng.2009.08.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park's two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park's protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client's identity. In this paper, we propose two protocols require less exchanged messages than Juang's protocols. In addition to this advantage, we point out that the identity protection of Juang's protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:213 / 223
页数:11
相关论文
共 50 条
  • [41] Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols
    Luo, Min
    Zhou, Xiaotong
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE ACCESS, 2017, 5 : 8017 - 8024
  • [42] Two-factor mutual authentication with key agreement in wireless sensor networks
    Vaidya, Binod
    Makrakis, Dimitrios
    Mouftah, Hussein
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 171 - 183
  • [43] Two-factor (Biometric and password) authentication key exchange on lattice based on key consensus
    Zongqu Z.
    Shaoti M.
    Yongjun W.
    Yongli T.
    Qing Y.
    [J]. Qing, Ye (yeqing@hpu.edu.cn), 1600, Beijing University of Posts and Telecommunications (27): : 42 - 53
  • [44] Two-factor (biometric and password) authentication key exchange on lattice based on key consensus
    Zhao Zongqu
    Ma Shaoti
    Wang Yongjun
    Tang Yongli
    Ye Qing
    [J]. The Journal of China Universities of Posts and Telecommunications, 2020, 27 (06) : 42 - 53
  • [45] Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model"
    Li, Xiaowei
    Yang, Dengqi
    Zeng, Xing
    Chen, Benhui
    Zhang, Yuqing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3344 - 3345
  • [46] Elliptic curve based password authenticated key exchange protocols
    Boyd, C
    Montague, P
    Nguyen, K
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 487 - 501
  • [47] Authenticated Key Exchange Protocols for Parallel Network File Systems
    Lim, Hoon Wei
    Yang, Guomin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (01) : 92 - 105
  • [48] Multi-factor authenticated key exchange
    Pointcheval, David
    Zimmer, Sebastien
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 277 - 295
  • [49] Deniable Public-Key Authenticated Quantum Key Exchange
    van Wier, Jeroen
    Atashpendar, Arash
    Roenne, Peter
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, SECITC 2023, 2024, 14534 : 97 - 112
  • [50] Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
    Lee, Jooyoung
    Park, Je Hong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 129 - 138