A Hierarchy of Authentication Specifications
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A hybrid authentication protocol for large mobile network
Journal of Systems and Software
Cryptanalysis of a hybrid authentication protocol for large mobile networks
Journal of Systems and Software
Theoretical Computer Science - Automated reasoning for security protocol analysis
AINA '07 Proceedings of the 21st International Conference on Advanced Networking and Applications
Analysing protocols subject to guessing attacks
Journal of Computer Security - Special issue on WITS'02
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Breaking and fixing public-key Kerberos
Information and Computation
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
A new efficient authentication protocol for mobile networks
Computer Standards & Interfaces
Analysing Password Protocol Security Against Off-line Dictionary Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
On the security of public key protocols
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. Especially, the communication efficiency and security are the critical factors. In this paper, we first analyse the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then, we propose an enhanced AKD protocol to overcome those vulnerabilities with the security functionality to prevent those malicious attacks. Security analysis and formal verification mainly using Automated Validation of Internet Security Protocols and Applications toolkit show that the proposed protocol is secure against those attacks. Copyright © 2011 John Wiley & Sons, Ltd.