Security enhancement of the communication-efficient AUTHMAC_DH protocols
Authentication and key distribution (AKD) protocols have become more important in the design of communication systems. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency, and the robustness of security. In this paper, we first...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/97816 http://hdl.handle.net/10220/12128 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-97816 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-978162020-03-07T14:02:43Z Security enhancement of the communication-efficient AUTHMAC_DH protocols Lv, Chao Ma, Maode Li, Hui Ma, Jianfeng Niu, Ben School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems Authentication and key distribution (AKD) protocols have become more important in the design of communication systems. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency, and the robustness of security. In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. Security analysis and formal verification by using AVISPA toolkit show that the proposed protocol can keep all the previous properties and is secure against the off-line guessing attack. 2013-07-24T08:53:58Z 2019-12-06T19:47:02Z 2013-07-24T08:53:58Z 2019-12-06T19:47:02Z 2011 2011 Journal Article Lv, C., Ma, M., Li, H., Ma, J., & Niu, B. (2012). Security enhancement of the communication-efficient AUTHMAC_DH protocols. Security and Communication Networks, 5(6), 674-680. 1939-0114 https://hdl.handle.net/10356/97816 http://hdl.handle.net/10220/12128 10.1002/sec.361 en Security and communication networks © 2011 John Wiley & Sons, Ltd. |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems Lv, Chao Ma, Maode Li, Hui Ma, Jianfeng Niu, Ben Security enhancement of the communication-efficient AUTHMAC_DH protocols |
description |
Authentication and key distribution (AKD) protocols have become more important in the design of communication systems. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency, and the robustness of security. In this paper, we first analyze the vulnerability of an AKD protocol under the off-line guessing attack. Then, we propose an enhanced AKD protocol to overcome the vulnerability. Security analysis and formal verification by using AVISPA toolkit show that the proposed protocol can keep all the previous properties and is secure against the off-line guessing attack. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Lv, Chao Ma, Maode Li, Hui Ma, Jianfeng Niu, Ben |
format |
Article |
author |
Lv, Chao Ma, Maode Li, Hui Ma, Jianfeng Niu, Ben |
author_sort |
Lv, Chao |
title |
Security enhancement of the communication-efficient AUTHMAC_DH protocols |
title_short |
Security enhancement of the communication-efficient AUTHMAC_DH protocols |
title_full |
Security enhancement of the communication-efficient AUTHMAC_DH protocols |
title_fullStr |
Security enhancement of the communication-efficient AUTHMAC_DH protocols |
title_full_unstemmed |
Security enhancement of the communication-efficient AUTHMAC_DH protocols |
title_sort |
security enhancement of the communication-efficient authmac_dh protocols |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/97816 http://hdl.handle.net/10220/12128 |
_version_ |
1681049958444171264 |