Title :
Attacks and solutions on Aydos-Savas-Koc´s wireless authentication protocol
Author :
Mangipudi, Kumar ; Malneedi, Nagaraja ; Katti, Rajendra ; Fu, Huirong
Author_Institution :
Dept. of Electr. & Comput. Eng., North Dakota State Univ., Fargo, ND, USA
fDate :
29 Nov.-3 Dec. 2004
Abstract :
M. Aydos, B. Savas and C.K. Koc (see Proc. 2nd Int. Workshop on Discrete Algorithms and Methods for Mobile Computing and Commun., 1998) proposed a wireless authentication and key agreement protocol (ASK-WAP) based on elliptic curve cryptography (ECC). We find that this protocol is vulnerable to a man-in-the-middle attack, a denial-of-service attack and an impersonation attack. We present the above mentioned attacks on the ASK-WAP. We also propose a variant of ASK-WAP, the user authentication protocol (UAP), so that it resists these attacks. Furthermore, we analyze the security and performance of the proposed UAP. The results show that our proposed UAP is much more secure and is also efficient with few message exchanges and less computation.
Keywords :
cryptography; message authentication; protocols; radio networks; telecommunication security; authenticated key exchange protocols; denial-of-service attack; elliptic curve cryptography; impersonation attack; key agreement protocol; man-in-the-middle attack; security; user authentication protocol; wireless authentication protocol; Authentication; Bandwidth; Computer crime; Cryptographic protocols; Elliptic curve cryptography; Neodymium; Performance analysis; Resists; Security; Wireless application protocol;
Conference_Titel :
Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
Print_ISBN :
0-7803-8794-5
DOI :
10.1109/GLOCOM.2004.1378405