File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
Title | An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication |
---|---|
Authors | |
Issue Date | 2005 |
Citation | Ieee Wireless Communications And Networking Conference, Wcnc, 2005, v. 4, p. 2088-2093 How to Cite? |
Abstract | To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session keys. However, most of the existing authenticated key agreement protocols are not designed for wireless mobile communication for which the bandwidth and the storage of the devices are limited. Also, mobile devices are more vulnerable to attack, providing forward secrecy would become an essential element in the protocol. In this paper, based on Seo and Sweeney's simple authenticated key agreement algorithm (SAKA), we develop an improved authenticated key agreement protocol that eliminates the disadvantages of SAKA and provides identity authentication, key validation, and perfect forward secrecy. Also, our protocol can foil man-in-the-middle attacks. We also show how our proposed protocol can be included in the current 3GPP2 specifications for OTASP to improve the A-Key (Authentication Key) distribution, which is the master key in IS-95 and CDMA2000 mobile networks. The proposed protocol requires significantly less bandwidth, and less computational and storage overhead while with higher security compared to 3GPP2 specifications. In fact, the proposed protocol can also be applied to other wireless communication scenarios. © 2005 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/151866 |
ISSN | 2020 SCImago Journal Rankings: 0.361 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sui, AF | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.contributor.author | Chow, KP | en_US |
dc.contributor.author | Tsang, WW | en_US |
dc.contributor.author | Chong, CF | en_US |
dc.contributor.author | Pun, KH | en_US |
dc.contributor.author | Chan, HW | en_US |
dc.date.accessioned | 2012-06-26T06:30:12Z | - |
dc.date.available | 2012-06-26T06:30:12Z | - |
dc.date.issued | 2005 | en_US |
dc.identifier.citation | Ieee Wireless Communications And Networking Conference, Wcnc, 2005, v. 4, p. 2088-2093 | en_US |
dc.identifier.issn | 1525-3511 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/151866 | - |
dc.description.abstract | To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session keys. However, most of the existing authenticated key agreement protocols are not designed for wireless mobile communication for which the bandwidth and the storage of the devices are limited. Also, mobile devices are more vulnerable to attack, providing forward secrecy would become an essential element in the protocol. In this paper, based on Seo and Sweeney's simple authenticated key agreement algorithm (SAKA), we develop an improved authenticated key agreement protocol that eliminates the disadvantages of SAKA and provides identity authentication, key validation, and perfect forward secrecy. Also, our protocol can foil man-in-the-middle attacks. We also show how our proposed protocol can be included in the current 3GPP2 specifications for OTASP to improve the A-Key (Authentication Key) distribution, which is the master key in IS-95 and CDMA2000 mobile networks. The proposed protocol requires significantly less bandwidth, and less computational and storage overhead while with higher security compared to 3GPP2 specifications. In fact, the proposed protocol can also be applied to other wireless communication scenarios. © 2005 IEEE. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | IEEE Wireless Communications and Networking Conference, WCNC | en_US |
dc.title | An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_US |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_US |
dc.identifier.email | Chow, KP:chow@cs.hku.hk | en_US |
dc.identifier.email | Tsang, WW:tsang@cs.hku.hk | en_US |
dc.identifier.email | Chong, CF:chong@cs.hku.hk | en_US |
dc.identifier.email | Pun, KH:pun@cs.hku.hk | en_US |
dc.identifier.email | Chan, HW:hwchan@cs.hku.hk | en_US |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.authority | Chow, KP=rp00111 | en_US |
dc.identifier.authority | Tsang, WW=rp00179 | en_US |
dc.identifier.authority | Chong, CF=rp00110 | en_US |
dc.identifier.authority | Pun, KH=rp00164 | en_US |
dc.identifier.authority | Chan, HW=rp00091 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.scopus | eid_2-s2.0-24944544374 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-24944544374&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 4 | en_US |
dc.identifier.spage | 2088 | en_US |
dc.identifier.epage | 2093 | en_US |
dc.publisher.place | United States | en_US |
dc.identifier.scopusauthorid | Sui, AF=6602768863 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_US |
dc.identifier.scopusauthorid | Tsang, WW=7201558521 | en_US |
dc.identifier.scopusauthorid | Chong, CF=7202196414 | en_US |
dc.identifier.scopusauthorid | Pun, KH=8979404900 | en_US |
dc.identifier.scopusauthorid | Chan, HW=24828151400 | en_US |
dc.identifier.issnl | 1525-3511 | - |