A new Authentication and Key Exchange Protocol for Insecure Networks

被引:0
|
作者
Fereidooni, H. [1 ]
Taheri, H. [1 ]
Mahramian, M. [2 ]
机构
[1] Amirkabir Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Informat Serv Corp, Tehran, Iran
关键词
PublicKey; Private Key; Encryption; Authentication; Internet key exchange(IKE); BAN-logic;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security authentication and key negotiation is an important foundation of network security. In this paper, a new authentication and key exchange protocol is presented. The proposed protocol is logically analyzed with the BAN-logic and discussed as a secure protocol. The results of analysis indicate that the protocol is correct and satisfies the security requirements of the Internet key exchange
引用
收藏
页码:4541 / +
页数:3
相关论文
共 50 条
  • [1] A new authentication and key exchange protocol in WLAN
    Zhuo, C
    Fan, H
    Liang, H
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 552 - 556
  • [2] Key Exchange Protocol over Insecure Channel
    Fahmy, Alaa
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 34 - 36
  • [3] Design of authentication and key exchange protocol in ethernet passive optical networks
    Roh, SS
    Kim, SH
    Kim, GH
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 1035 - 1043
  • [4] An enhanced authentication key exchange protocol
    Hwang, RJ
    Shiau, SH
    Lai, CH
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 202 - 205
  • [5] A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Chen, Chien-Ming
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] On the security of an enhanced authentication key exchange protocol
    Hwang, MS
    Chang, TY
    Lin, SC
    Tsai, CS
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 160 - 163
  • [7] Authentication Key Exchange Protocol for IMS Network
    Bao, Hui
    Xu, Fangqin
    Huang, Xia
    2010 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2010,
  • [8] Three-Tier Authentication and Secure Key Exchange Over Insecure Channel
    Ahmad, Muzammil M.
    Khan, Sibghatullah I.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), 2017, : 134 - 137
  • [9] An Efficient Three-Party Authentication Key Exchange Protocol for Wireless Sensor Networks
    Li, Hongtu
    Hu, Liang
    Chu, Jianfeng
    Chi, Ling
    Li, Hongwei
    SENSOR LETTERS, 2013, 11 (05) : 990 - 996
  • [10] Universally composable authentication and key exchange protocol for access control in spatial information networks
    Guo, Yuan-Bo
    Wang, Chao
    Wang, Liang-Min
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (10): : 2358 - 2364