A Survey on Recently Proposed Key Exchange Protocols for Mobile Environment

Background/Objectives: Cryptographic protocols are used for securing information when transmitting it over insecure network such as Internet. This paper’s objective is to study recently proposed key exchange protocols for mobile environment. Methods/Statistical Analysis: In this paper we do a literature survey of recently proposed key exchange protocols for mobile environment. We analyze execution of protocol in three phases i.e. initialization, communication, renewal/ termination phase. In initialization protocol prepares for key exchange process. Next, protocol actually communicates with others to exchange secret key. Third protocol may terminate or renew connection for further communication. We also study activities done by protocols that define characteristics of protocol. Findings: In this paper we find that there are many parameters to consider when designing a key exchange protocols for mobile environment. However, significance of parameters is different, based on the security requirement of application for which protocol is being developed. Strength of a protocol is in the encryption technique that it uses. Hence, stronger encryption techniques results in better security of protocol. Speed of protocol is another important parameter. Length of steps in algorithm of protocol is directly proportional to its speed. A protocol must be able to withstand various attacks on it. A protocol should have high reliability if it is to be used in handling critical data. We found that modern key exchange protocols are not properly analyzed and tested before being proposed. Instead of working on already proposed protocols and solve their vulnerabilities and strengthening them researchers are proposing new protocols without testing them properly for vulnerabilities which are later exploited by malicious users. Applications/Improvements: This research paper will help researchers and protocol designers. It will give them idea about design parameters when designing key exchange protocol. It will enable them to take better decisions.

[1]  Erl-Huei Lu,et al.  Secured key exchange protocol in wireless mobile ad hoc networks , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[2]  Mihaela Cardei,et al.  Routing Security in Ad Hoc Wireless Networks , 2010 .

[3]  Dengguo Feng,et al.  An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks , 2011, Comput. Commun..

[4]  Zuowen Tan An Enhanced Three-Party Authentication Key Exchange Protocol for Mobile Commerce Environments , 2010, J. Commun..

[5]  Wei-Pang Yang,et al.  A communication-efficient three-party password authenticated key exchange protocol , 2011, Inf. Sci..

[6]  Hua Zhang,et al.  Smart card-based authenticated key exchange protocol with CAPTCHA for wireless mobile network , 2010, 2010 2nd International Conference on Future Computer and Communication.

[7]  Syed Taha Ali,et al.  Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.

[8]  Yuh-Min Tseng,et al.  An efficient user authentication and key exchange protocol for mobile client-server environment , 2010, Comput. Networks.

[9]  Douglas Stebila,et al.  Quantum Key Distribution in the Classical Authenticated Key Exchange Framework , 2012, PQCrypto.

[10]  Lei Chen Applications, Technologies, and Standards in Secure Wireless Networks and Communications , 2013 .

[11]  Ruchuan Wang,et al.  Novel Three-Party Password-Based Authenticated Key Exchange Protocol for Wireless Sensor Networks , 2012, CWSN.

[12]  Massimo Merro,et al.  A Calculus for the Analysis of Wireless Network Security Protocols , 2010, Formal Aspects in Security and Trust.

[13]  Yijun He,et al.  Towards a secure mutual authentication and key exchange protocol for mobile communications , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.

[14]  Hermann de Meer,et al.  Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..

[15]  Maryam Saeed,et al.  Security analysis and improvement of Smart Card-Based Authenticated Key Exchange protocol with CAPTCHAs for wireless mobile network , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[16]  Dawu Gu,et al.  Provably secure three-party password-based authenticated key exchange protocol , 2012, Inf. Sci..

[17]  Eric Gamess,et al.  Analyzing Routing Protocol Performance with Nctuns for Vehicular Networks , 2014 .

[18]  Ding-Zhu Du,et al.  Wireless Network Security , 2009, EURASIP J. Wirel. Commun. Netw..