Title :
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices
Author :
Yang, Jen-Ho ; Chang, Chin-Chen ; Lin, Shih-Yi
Author_Institution :
Dept. of Inf. & Electron. Commerce, Kainan Univ., Taoyuan, Taiwan
Abstract :
Authentication with key agreement protocol (AKA) can provide mutual authentication and create a session key between two communication parties. In 2005, Chen and Yeh proposed an AKA protocol based on one-way hash function and exclusive-or (XOR) operations. Having the feature of fast processing, their protocol is more efficient than previously related works. However, we discover that Chen and Yeh´s protocol cannot withstand denial of service (DoS) attack. Moreover, their protocol has redundant communication rounds such that it is not efficient for mobile devices. Therefore, we propose an efficient AKA protocol for mobile devices in this paper, which has lower computation and communication loads. Moreover, our protocol can prevent DoS attack and does not require a verification table in the server. In a word, our AKA protocol is efficient and practical for mobile devices.
Keywords :
cryptographic protocols; file organisation; message authentication; mobile computing; mobile handsets; communication loads; communication parties; computation loads; denial of service attack; exclusive-or operations; key agreement protocol; mobile devices; mutual authentication; one-way hash function; redundant communication rounds; Authentication; Computer crime; Mobile handsets; Protocols; Servers; Smart cards; Authentication with key agreement; denial of service; mobile device; one-way hash function;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4577-1397-2
DOI :
10.1109/IIHMSP.2011.60