About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
3rd International ICST Symposium on Information Assurance and Security

Research Article

A Secure Authenticated Key Agreement Protocol For Wireless Security

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/IAS.2007.56,
        author={ Pierre  E. ABI-CHAR and Abdallah  MHAMED and Bachar EL-HASSAN},
        title={A Secure Authenticated Key Agreement Protocol For Wireless Security},
        proceedings={3rd International ICST Symposium on  Information Assurance and Security},
        publisher={IEEE},
        proceedings_a={IAS},
        year={2007},
        month={9},
        keywords={Authentication  Communication system security  Dictionaries  Network servers  Protection  Resilience  Resists  Robustness  Wireless LAN  Wireless application protocol},
        doi={10.1109/IAS.2007.56}
    }
    
  • Pierre E. ABI-CHAR
    Abdallah MHAMED
    Bachar EL-HASSAN
    Year: 2007
    A Secure Authenticated Key Agreement Protocol For Wireless Security
    IAS
    IEEE
    DOI: 10.1109/IAS.2007.56
Pierre E. ABI-CHAR1,*, Abdallah MHAMED1,*, Bachar EL-HASSAN2,*
  • 1: UMR CNRS 5157 GET/Institut National des Telecommunications ´ 9 rue C. Fourier - 91011 Evry CEDEX - France
  • 2: Libanese University Faculty of Engineering Tripoli - Lebanon
*Contact email: pierre.abichar@int-edu.eu, abdallah.mhamed@int-edu.eu, bachar_elhassan@ul.edu.lb

Abstract

Several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a new secure authenticated key agreement (SAKA) protocol that provides secure mutual authentication, key establishment and key confirmation over an untrusted network. The new protocol achieves many of the required security and performance properties. It can resist dictionary attacks mounted by either passive or active networks intruders. It can resist Man-In-The Middle attack, and Impersonate attack. It also offers perfect forward secrecy which protects past sessions and passwords against future compromise. In addition, it can resist known-key and resilience to server attack. Our proposed protocol combines techniques of challenge- response protocols with symmetric key agreement protocols and offers significantly improved performance in computational and communication load over comparably many authenticated key agreement protocols such as B-SPEKE, SRP, AMP, PAK-RY, PAK-X, SKA and LR-AKE.

Keywords
Authentication Communication system security Dictionaries Network servers Protection Resilience Resists Robustness Wireless LAN Wireless application protocol
Published
2007-09-10
Publisher
IEEE
Modified
2011-08-01
http://dx.doi.org/10.1109/IAS.2007.56
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL