Comments on the Lu-Su Authenticated Key Agreement Scheme in Ad hoc Networks
نویسنده
چکیده
Lu and Su [Comm. Of the CCISA 12(1) (2006) pp.93-104] proposed an authenticated key agreement scheme in Ad hoc Networks. Their scheme based on Shamir’s ID-based cryptosystem and Okamoto’s key distribution system attempts concurrently to achieve two goals: (1) any mobile node A can authenticate the other one B, who is communicating with A, is illegitimate node or not, and (2) A and B can obtain a secure common session key by using key agreement protocol. Unfortunately, in this paper, we will show that the Lu-Su scheme is vulnerable to both the impersonation and the forgery attack. In addition, some modifications are provided to enhance the security problems.
منابع مشابه
An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A lot of research has been carried out in the areas of authentication and key management for such networks. However, due to lack of existing standards for such networks, most of the proposed schemes are based on different assumptions and are applicable only in specific ...
متن کاملAn Authenticated Clustering-based Group Key Agreement for Large Ad Hoc Networks
Group key agreement protocols for wired networks are not applicable in ad hoc networks because of the 1-hop assumption of these protocols and the dynamic, multi-hop attributes of ad hoc networks. An authenticated group key agreement for ad hoc networks is proposed which arranges the group members in a cluster-based hierarchical spanning tree structure. The scheme uses Intra-cluster group key ag...
متن کاملSecured Key Agreement Scheme with Trust Forcluster Based Mobile Ad Hoc Networks
Mobile Ad-hoc Networks (MANET) has become prominent in recent years whose security is one among the major issue concerned extensively. The security solutions from various researches lacks in considering node to node communication, especially in the infrastructure-less adhoc networks. In this paper, we present a one round secured key agreement scheme with trust (SKAT) in a cluster based MANET en...
متن کاملA secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exch...
متن کاملA New Group Key Management Protocol for Wireless Ad-Hoc Networks
Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007