Skip to main content
Log in

A new provably-secure key agreement protocol for roaming in mobile networks

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Earle A E. Wireless Security Handbook[M]. London: Auerbach Publications, 2006.

    Google Scholar 

  2. Boyd C, Mathuria A. Key Establishment Protocols for Secure Mobile Communications: A Critical Survey [J]. Computers Communications, 2000, 23(2): 575–587.

    Article  Google Scholar 

  3. Blumental U, Buddhikot M. A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks [J]. Bell Labs Technical Journal, 2002, 7(2): 37–48.

    Article  Google Scholar 

  4. Bellare M, Rogaway P. Entity Authentication and Key Distribution[C]//Proc of Crypto’93. New York: Springer-Verlag, 1994: 232.

    Google Scholar 

  5. Bellare M, Rogaway P. Provably Secure Session Key Distribution— the Three Party Case[C]//Proc of the ACM Symp on the Theory of Computing. New York: ACM Press, 1995: 57.

    Google Scholar 

  6. Canetti R, Krawczyk H. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels [C]//Proc of Eurocrypt’2001. Paris: Springer-Verlag, 2001: 453.

    Google Scholar 

  7. Lai X, Ma J. An 802.11i Robust Security Network Authentication Protocol of Roaming [J]. Chinese Journal of Computers, 2005, 28(12): 2027–2035 (Ch).

    Google Scholar 

  8. Yvonne H, Colin B. Tripartite Key Exchange in the Canetti-Krawczyk Proof Model [C]//Proc of Indorcypt’2004. Singapore: Springer-Verlag, 2004: 17.

    Google Scholar 

  9. Tin Y S T, Vasanta H, Boyd C, et al. Protocols with Security Proofs for Mobile Applications [C]//Proc of ACISP’2004. Berlin: Springer-Verlag, 2004: 358.

    Google Scholar 

  10. Li Yahui, Li Fenghua, Yang Weidong, et al. Provably Secure Authentication Protocol for Heterogeneous Wireless Networks[J]. Journal on Communications, 2007, 28(11): 21–29 (Ch).

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangsong Li.

Additional information

Foundation item: Supported by the National High Technology Research and Development Program of China (2007AA01Z43)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, G., Wang, P. A new provably-secure key agreement protocol for roaming in mobile networks. Wuhan Univ. J. Nat. Sci. 13, 605–608 (2008). https://doi.org/10.1007/s11859-008-0519-0

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0519-0

Key words

CLC number

Navigation