An Advanced Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks

Less computational load and better efficiency on password authenticated key exchange between a low-power client and a powerful server is very important, especially in a wireless communication environment due to the constraints on the electricity supply. The proposed scheme is based on the RSA cryptography and the concept of key exchange. It reduces the load of computation on clients to fit the low-power property of clients without yield the security. Through the comparisons with other protocols, we show that the proposed scheme is more suitable to apply in imbalanced wireless communication environment.

[1]  Jung-Wen Lo The Improvement of YSYCT Scheme for Imbalanced Wireless Network , 2006, Int. J. Netw. Secur..

[2]  Cheng-Chi Lee,et al.  A new key authentication scheme based on discrete logarithms , 2003, Appl. Math. Comput..

[3]  Min-Shiang Hwang,et al.  An Improvement of a Simple Authenticated Key Agreement Algorithm , 2002 .

[4]  Peter Sweeney,et al.  Simple authenticated key agreement algorithm , 1999 .

[5]  Dong Hoon Lee,et al.  A note on leakage-resilient authenticated key exchange , 2009, IEEE Transactions on Wireless Communications.

[6]  Zhenfu Cao,et al.  Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..

[7]  Wen-Shenq Juang,et al.  Efficient User Authentication and Key Agreement with User Privacy Protection , 2008, Int. J. Netw. Secur..

[8]  Zhenfu Cao,et al.  Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy , 2008, Int. J. Netw. Secur..

[9]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Jongin Lim,et al.  Weakness in a RSA-based password authenticated key exchange protocol , 2008, Inf. Process. Lett..

[11]  Chien-Lung Hsu,et al.  New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks , 2007 .

[12]  Chin-Chen Chang,et al.  Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..

[13]  Jia Lun Tsai Efficient Nonce-based Authentication Scheme for Session Initiation Protocol , 2009, Int. J. Netw. Secur..

[14]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[15]  Chou Chen Yang,et al.  Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks , 2005, IEICE Trans. Commun..

[16]  Taekyoung Kwon Practical Authenticated Key Agreement Using Passwords , 2004, ISC.

[17]  Feng Zhu,et al.  Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks , 2002, ISC.

[18]  Min-Shiang Hwang,et al.  Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack , 2004, Fundam. Informaticae.

[19]  B. Sathish Babu,et al.  A Dynamic Authentication Scheme for Mobile Transactions , 2009, Int. J. Netw. Secur..

[20]  Jie Liu,et al.  A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol , 2010, Int. J. Netw. Secur..