期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
1
作者 Somayeh Soltani Seyed Amin Hosseini Seno +1 位作者 Juli Rejito Rahmat Budiarto 《Computers, Materials & Continua》 SCIE EI 2022年第6期5891-5910,共20页
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab... Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority. 展开更多
关键词 Satellite communications AUTHENTICATION session key agreement secure communication security protocols formal verification
下载PDF
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings 被引量:1
2
作者 WANG Shengbao CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期63-66,共4页
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (C... Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol. 展开更多
关键词 authenticated key agreement (AK) certificatebased encryption (CBE) PAIRINGS session key escrow perfect forward security
下载PDF
Lightweight Key Management Scheme Using Fuzzy Extractor for Wireless Mobile Sensor Network
3
作者 Eid Rehman Ibrahima Kalil Toure +5 位作者 Kashif Sultan Muhammad Asif Muhammad Habib Najam Ul Hasan Oh-Young Song Aaqif Afzaal Abbasi 《Computers, Materials & Continua》 SCIE EI 2022年第4期1695-1712,共18页
The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile se... The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance.All such types of applications based on wireless mobile sensor network are generally using real time data,most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network.This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station.But this leads to a serious security breach and degrades the performance of any security protocol available in this domain.Most existing schemes for authentication and cluster key management for external users,exchange a number of messages between cluster head and base station to allow external to access real time data from the base station instead of cluster head.This increase communication cost and delay in such real time access information.To handle this critical issue in cluster wireless mobile sensor network,we propose a lightweight authentication and key management scheme using a fuzzy extractor.In this scheme,any external user can access data directly from the cluster head of any cluster without the involvement of the base station.The proposed scheme only uses the one-way hash functions and bitwise XOR operations,apart from the fuzzy extractor method for the user biometric verification at the login phase.The presented scheme supports scalability for an increasing number of nodes using polynomials.The proposed scheme increases the life-time of the network by decreasing the key pool size. 展开更多
关键词 Fuzzy extractor user authentication key management cluster session key wireless mobile sensor network
下载PDF
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
4
作者 Shunbo Xiang Bing Xu Ke Chen 《Journal of Computer and Communications》 2021年第4期102-109,共8页
To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user ... To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user stores his password in plaintext, and the server stores a verifier for the user’s password, using DL difficult problem and DH difficult problem, through the session between user and server to establish a session key. The security discussion result shows that the proposed protocol provides forward secrecy, and can effectively defend against server compromising fake attacks, dictionary attacks and middleman attacks. Protocol efficiency comparisons reveal our protocol is more reasonable. 展开更多
关键词 VERIFIER Password-Authenticated key Exchange Fake Attack Dictionary Attack session key
下载PDF
A NEW TWO-WAY AUTHENTICATION AND PRIVACY MECHANISM FOR WLAN SECURITY
5
作者 郑庆华 David Pepyne 《Journal of Pharmaceutical Analysis》 SCIE CAS 2003年第2期111-115,共5页
Objective Aiming at lots of vulnerabilities in the Wired Equivalent Privacy (WEP) which threats the authentication and confidentiality in wireless communication, a new kind of mutual authentication and privacy mechan... Objective Aiming at lots of vulnerabilities in the Wired Equivalent Privacy (WEP) which threats the authentication and confidentiality in wireless communication, a new kind of mutual authentication and privacy mechanism named MWEP(Modified WEP) is proposed. Methods MWEP is based on pseudo random number generator (PRNG) and asymmetric cryptograph approach, it generates a unique session key like “One Time Password” for each data frame transmission between any two mobile stations. Results Using this session key to encrypt the transmission data, not only can it avoid replay attack, but also provide a good secure virtual channel for the sender and receiver. MWEP can be incorporated into IEEE 802.11. Conclusion It shows that the proposed mechanism is effective and practical after comparison with WEP and simulation. 展开更多
关键词 wireless LAN security authentication PRIVACY WEP PRNG session key
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部