Server based PMK generation with identity protection for wireless networks

Pairwise key generation between two parties is a fundamental problem in cryptography and computer security. In wireless networks, since it is dangerous to store any long-lived secret in wireless devices, pairwise master key (PMK) generation between two parties is based either on passwords (with low entropy) or on some other information. Due to the limited power and computational ability of wireless devices, it is preferable to design protocols with low communication cost and lightweight computation in the client side. In this paper, we propose two PMK generation protocols for wireless networks. The first is based on a shared password between the wireless client and a server (or base station) with more storage and computational power. It only needs lightweight computation for the wireless client, and achieves forward secrecy. The second protocol is used for PMK generation between two wireless devices with the help of the server. Both protocols provide the identity protection for the wireless devices and the mechanism for the server to thwart denial of service (DoS) attacks. These two features are ignored by most previous work, but they are very important for the practical implementation of wireless security protocols. To the best of our knowledge, our protocols are the first to achieve lightweight client computation, identity protection and DoS resistancy simutaneously.

[1]  Angelos D. Keromytis,et al.  Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols , 2001, Security Protocols Workshop.

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[4]  Stefan Lucks,et al.  Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys , 1997, Security Protocols Workshop.

[5]  Takahiro Kiuchi Report on the Internet Society Symposium on Network and Distributed System Security , 1999 .

[6]  Christoph G. Günther,et al.  An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.

[7]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[8]  Sarvar Patel,et al.  Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.

[9]  Hugo Krawczyk,et al.  SKEME: a versatile secure key exchange mechanism for Internet , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[10]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[11]  Ari Juels,et al.  $evwu Dfw , 1998 .

[12]  Angelos D. Keromytis,et al.  Efficient, DoS-resistant, secure key exchange for internet protocols , 2001, CCS '02.

[13]  Sarvar Patel,et al.  Password-Authenticated Key Exchange Based on RSA , 2000, ASIACRYPT.

[14]  Feng Zhu,et al.  Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks , 2002, ISC.

[15]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[16]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[17]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .