Analysis on Imai-Shin’s LR-AKE Protocol for Wireless Network Security
暂无分享,去创建一个
In 2005 Imai and Shin proposed a leakage-resilient authenticated key exchange protocol(LR-AKE) for wireless network security. For simplicity, the protocol is based on password authentication plus additional secrets to fit wireless environment (e.g., computation constraint). In this paper we show that Imai-Shin’s scheme is vulnerable to both client and server impersonation attacks and needs to be improved to provide strong security for wireless network.
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] SeongHan Shin,et al. Authenticated key exchange for wireless security , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[3] Alistair Munro,et al. Performance comparison of cooperative and non-cooperative relaying mechanisms in wireless networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..