DocumentCode :
423245
Title :
Attacks and solutions on Aydos-Savas-Koc´s wireless authentication protocol
Author :
Mangipudi, Kumar ; Malneedi, Nagaraja ; Katti, Rajendra ; Fu, Huirong
Author_Institution :
Dept. of Electr. & Comput. Eng., North Dakota State Univ., Fargo, ND, USA
Volume :
4
fYear :
2004
fDate :
29 Nov.-3 Dec. 2004
Firstpage :
2229
Abstract :
M. Aydos, B. Savas and C.K. Koc (see Proc. 2nd Int. Workshop on Discrete Algorithms and Methods for Mobile Computing and Commun., 1998) proposed a wireless authentication and key agreement protocol (ASK-WAP) based on elliptic curve cryptography (ECC). We find that this protocol is vulnerable to a man-in-the-middle attack, a denial-of-service attack and an impersonation attack. We present the above mentioned attacks on the ASK-WAP. We also propose a variant of ASK-WAP, the user authentication protocol (UAP), so that it resists these attacks. Furthermore, we analyze the security and performance of the proposed UAP. The results show that our proposed UAP is much more secure and is also efficient with few message exchanges and less computation.
Keywords :
cryptography; message authentication; protocols; radio networks; telecommunication security; authenticated key exchange protocols; denial-of-service attack; elliptic curve cryptography; impersonation attack; key agreement protocol; man-in-the-middle attack; security; user authentication protocol; wireless authentication protocol; Authentication; Bandwidth; Computer crime; Cryptographic protocols; Elliptic curve cryptography; Neodymium; Performance analysis; Resists; Security; Wireless application protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
Print_ISBN :
0-7803-8794-5
Type :
conf
DOI :
10.1109/GLOCOM.2004.1378405
Filename :
1378405
Link To Document :
بازگشت