A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS

Considering the performance, encrypting the transmission message by the symmetric cryptosystem is the best choice if the session key generation problem is overcome. Diffie-Hellman key exchange protocol gives a new direction for making session key but is lack of the authentication property. The RSA-based public key cryptography makes the sufficient security for the key agreement but is not suitable for wireless mobile systems. In 2005, Sui et al. proposed an authenticated key agreement (AKA) protocol based on the elliptic curve cryptography (ECC) for wireless mobile communication. Lu et al. pointed out a secure defect in Sui et al.’s protocol and proposed an enhanced protocol. Later, Chang et al. stated that Lu’s scheme is insecure and proposed an improved scheme in 2008. We found that Chang et al.’s scheme did not satisfy the mutual authentication, so a securer and more efficient protocol is proposed. The protocol can be applied not only in 3GPP2 specification but also in other wireless environments.

[1]  Sarvar Patel,et al.  Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.

[2]  Peter Sweeney,et al.  Simple authenticated key agreement algorithm , 1999 .

[3]  Zhenfu Cao,et al.  Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..

[4]  Min-Shiang Hwang,et al.  An Improvement of a Simple Authenticated Key Agreement Algorithm , 2002 .

[5]  Siu-Ming Yiu,et al.  An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[6]  Min-Shiang Hwang,et al.  Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack , 2004, Fundam. Informaticae.

[7]  Taekyoung Kwon,et al.  Practical Authenticated Key Agreement Using Passwords , 2004, ISC.

[8]  David P. Jablon Strong password-only authenticated key exchange , 1996, CCRV.

[9]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Chris J. Mitchell,et al.  Key control in key agreement protocols , 1998 .

[11]  Zhenfu Cao,et al.  An enhanced authenticated key agreement protocol for wireless mobile communication , 2007, Comput. Stand. Interfaces.

[12]  Wen-Shenq Juang,et al.  Efficient User Authentication and Key Agreement with User Privacy Protection , 2008, Int. J. Netw. Secur..

[13]  Wen Gao,et al.  Elliptic Curve Cryptography Based Wireless Authentication Protocol , 2007, Int. J. Netw. Secur..

[14]  Chin-Chen Chang,et al.  An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[15]  Hong Chen,et al.  EXPERIMENTAL STUDY ON SECURE COMMUNICATION OF DIFFERENT SCROLL CHAOTIC SYSTEMS WITH IDENTICAL STRUCTURE , 2008 .

[16]  Cheng-Chi Lee,et al.  A new key authentication scheme based on discrete logarithms , 2003, Appl. Math. Comput..

[17]  Kunihiro Yamada,et al.  THE HOME NETWORK SYSTEM BY MUTUAL COMPLEMENT OF WIRELESS AND WIRED COMMUNICATIONS , 2008 .