{"title":"A New Authenticated Key Agreement Protocol for Wireless Mobile Networks","authors":"Shin-Jia Hwang, M. Chai","doi":"10.1109/IAS.2009.58","DOIUrl":null,"url":null,"abstract":"For secure communications over wireless mobile networks, Lu et al proposed their secure authentication key agreement protocol. However, Lu et al’s protocol is vulnerable against Chang and Chang’s parallel guessing attack. To remove the parallel guessing attacks, Chang and Chang also proposed their improvement. However, Chang and Chang’s protocol is still vulnerable against their parallel guessing attack. So our new authenticated key agreement protocol for wireless mobile networks is proposed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fifth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2009.58","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
For secure communications over wireless mobile networks, Lu et al proposed their secure authentication key agreement protocol. However, Lu et al’s protocol is vulnerable against Chang and Chang’s parallel guessing attack. To remove the parallel guessing attacks, Chang and Chang also proposed their improvement. However, Chang and Chang’s protocol is still vulnerable against their parallel guessing attack. So our new authenticated key agreement protocol for wireless mobile networks is proposed.