A Secure MAKAP for Wireless Communication

被引:4
|
作者
LIU Zhimeng
机构
关键词
mutual authentication and key agreement; elliptic curve cryptography; cryptanalysis;
D O I
暂无
中图分类号
TN918 [通信保密与通信安全];
学科分类号
0839 ; 1402 ;
摘要
A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement a session key in the end of it. Unfortunately, Mangipudi pointed out Aydos’ scheme was incurred the man-in-middle attack denial-of-service attack and impersonation based on man-in-middle attack. Then he proposed an improved scheme to overcome the above weakness. However, there is an attack which can forge the message required in the protocol and impersonation a valid user to the server.
引用
收藏
页码:1749 / 1752
页数:4
相关论文
共 50 条
  • [41] Secure and efficient key agreement protocols for wireless communication
    Yang, HK
    An, YH
    Choi, J
    2005 Asia-Pacific Conference on Communications (APCC), Vols 1& 2, 2005, : 520 - 524
  • [42] Deep Learning for Secure Transmission in Wireless Communication Networks
    Olowononi, Felix O.
    Rawat, Danda B.
    Kamhoua, Charles A.
    2022 IEEE International Conference on Communications Workshops, ICC Workshops 2022, 2022, : 379 - 384
  • [43] Application of Full Duplex Guarantees Secure Wireless Communication
    Guo, Yong
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2017, 19 (02) : 105 - 113
  • [44] Secure Communication Protocol for Mobile Wireless Sensor Networks
    Sarma, Hiren Kumar Deva
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 779 - 784
  • [45] Transmit Optimization for Secure MIMO RFID Wireless Communication
    Yang, Qian
    Zhang, Yi
    Wang, Hui-Ming
    Han, Zhu
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [46] Secure Wireless Communication Using Support Vector Machines
    Hoang, Tiep M.
    Duong, Trung Q.
    Lambotharan, Sangarapillai
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019,
  • [47] Secure Communication in Mobile Underwater Wireless Sensor Networks
    Das, Anjana P.
    Thampi, Sabu M.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2164 - 2173
  • [48] Analysis of the power consumption of secure communication in wireless networks
    Kim, Kihong
    Hong, Jinkeun
    Lim, Jongin
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, 4080 : 894 - 903
  • [49] Secure Communication for Cluster Based Wireless Sensor Network
    Banerjee, Koushik
    Sharma, Hemant
    Chaurasia, Brijesh Kumar
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 867 - 871
  • [50] An approach for secure wireless communication using friendly noise
    Aggarwal, Parag
    Trivedi, Aditya
    Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, 2014, : 1578 - 1584