Comments on the Lu-Su Authenticated Key Agreement Scheme in Ad hoc Networks

نویسنده

  • Yi-Hwa Chen
چکیده

Lu and Su [Comm. Of the CCISA 12(1) (2006) pp.93-104] proposed an authenticated key agreement scheme in Ad hoc Networks. Their scheme based on Shamir’s ID-based cryptosystem and Okamoto’s key distribution system attempts concurrently to achieve two goals: (1) any mobile node A can authenticate the other one B, who is communicating with A, is illegitimate node or not, and (2) A and B can obtain a secure common session key by using key agreement protocol. Unfortunately, in this paper, we will show that the Lu-Su scheme is vulnerable to both the impersonation and the forgery attack. In addition, some modifications are provided to enhance the security problems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks

The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A lot of research has been carried out in the areas of authentication and key management for such networks. However, due to lack of existing standards for such networks, most of the proposed schemes are based on different assumptions and are applicable only in specific ...

متن کامل

An Authenticated Clustering-based Group Key Agreement for Large Ad Hoc Networks

Group key agreement protocols for wired networks are not applicable in ad hoc networks because of the 1-hop assumption of these protocols and the dynamic, multi-hop attributes of ad hoc networks. An authenticated group key agreement for ad hoc networks is proposed which arranges the group members in a cluster-based hierarchical spanning tree structure. The scheme uses Intra-cluster group key ag...

متن کامل

Secured Key Agreement Scheme with Trust Forcluster Based Mobile Ad Hoc Networks

Mobile Ad-hoc Networks (MANET) has become prominent in recent years whose security is one among the major issue concerned extensively. The security solutions from various researches lacks in considering node to node communication, especially in the infrastructure-less adhoc networks. In this paper, we present a one round secured key agreement scheme with trust (SKAT) in a cluster based MANET en...

متن کامل

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks

Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exch...

متن کامل

A New Group Key Management Protocol for Wireless Ad-Hoc Networks

Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007