Security analysis on a conference scheme for mobile communications

被引:0
|
作者
Wan, ZG [1 ]
Bao, F
Deng, RH
Ananda, AL
机构
[1] Natl Univ Singapore, Sch Comp, Singapore 117543, Singapore
[2] Inst Infocomm Res, Singapore 119613, Singapore
[3] Singapore Management Univ, Sch Informat Syst, Singapore 259756, Singapore
关键词
mobile communications; conference scheme; security; privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually obtain low power and limited computing capability. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content.
引用
收藏
页码:1238 / 1240
页数:3
相关论文
共 50 条
  • [41] The Evolution and Future Perspective of Security in Mobile Communications Networks
    Pavia, Joao
    Lopes, Diogo
    Cristovao, Pedro
    Sebastiao, Pedro
    Correia, Americo
    2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 267 - 276
  • [42] Coordination and security: How mobile communications affect insurgency
    Shapiro, Jacob N.
    Siegel, David A.
    JOURNAL OF PEACE RESEARCH, 2015, 52 (03) : 312 - 322
  • [43] Application Security in Mobile Devices Using Unified Communications
    Josyula, Ramakrishna
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 135 - 143
  • [44] An Efficient Signature Matching Scheme for Mobile Security
    Zhang, Ruhui
    Iwata, Makoto
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (10) : 3251 - 3261
  • [45] Random security scheme selection for mobile transactions
    Babu, B. Sathish
    Venkataram, Pallapa
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (06) : 694 - 708
  • [46] Block coded modulation scheme for mobile radio communications
    AlSanie, AM
    INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 1997 DIGEST OF TECHNICAL PAPERS, 1997, : 190 - 191
  • [47] Mailbox-based scheme for mobile agent communications
    Cao, JN
    Feng, XY
    Lu, J
    Das, SK
    COMPUTER, 2002, 35 (09) : 54 - +
  • [48] 2022 IEEE Conference on Communications and Network Security, CNS 2022
    2022 IEEE Conference on Communications and Network Security, CNS 2022, 2022,
  • [49] Proceedings of the ACM Conference on Computer and Communications Security 2009: Foreword
    Balfanz, Dirk
    Staddon, Jessica
    Proceedings of the ACM Conference on Computer and Communications Security, 2009,
  • [50] CONFERENCE KEY DISTRIBUTION SCHEMES FOR SECURE DIGITAL MOBILE COMMUNICATIONS
    HWANG, MS
    YANG, WP
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (02) : 416 - 420