Security analysis on a conference scheme for mobile communications

被引:0
|
作者
Wan, ZG [1 ]
Bao, F
Deng, RH
Ananda, AL
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117543, Singapore
[2] Inst Infocomm Res, Singapore 119613, Singapore
[3] Singapore Management Univ, Sch Informat Syst, Singapore 259756, Singapore
关键词
mobile communications; conference scheme; security; privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually obtain low power and limited computing capability. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content.
引用
收藏
页码:1238 / 1240
页数:3
相关论文
共 50 条
  • [31] Proceedings of the ACM Conference on Computer and Communications Security: Foreword
    Jin, Hongxia
    Joye, Marc
    Proceedings of the ACM Conference on Computer and Communications Security, 2010,
  • [32] Proceedings of the ACM Conference on Computer and Communications Security: Foreword
    Karjoth, Günter
    Stølen, Ketil
    Proceedings of the ACM Conference on Computer and Communications Security, 2007,
  • [33] Cognitive Mobile Security Invited Conference Keynote
    Lubensky, David
    Pistoia, Marco
    Lin, Ching-Yung
    Tripp, Omer
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 267 - 268
  • [34] Efficient Mobile Conference Scheme for Wireless Communication
    Lou, Der-Chyuan
    Liu, Kuo-Ching
    Huang, Hui-Feng
    INFORMATICA, 2013, 24 (01) : 59 - 70
  • [35] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Shen, Han
    Kumar, Neeraj
    He, Debiao
    Shen, Jian
    Chilamkurti, Naveen
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3588 - 3600
  • [36] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Han Shen
    Neeraj Kumar
    Debiao He
    Jian Shen
    Naveen Chilamkurti
    The Journal of Supercomputing, 2016, 72 : 3588 - 3600
  • [37] Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) : 292 - 293
  • [38] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Rui Chen
    Dezhong Peng
    Wireless Personal Communications, 2017, 97 : 2665 - 2682
  • [39] An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications
    Chen, Rui
    Peng, Dezhong
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2665 - 2682
  • [40] A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
    You, Ilsun
    Sakurai, Kouichi
    Hori, Yoshiaki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (06) : 2287 - 2290