Abstract
Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model.
Similar content being viewed by others
References
Earle A E. Wireless Security Handbook[M]. London: Auerbach Publications, 2006.
Boyd C, Mathuria A. Key Establishment Protocols for Secure Mobile Communications: A Critical Survey [J]. Computers Communications, 2000, 23(2): 575–587.
Blumental U, Buddhikot M. A Scheme for Authentication and Dynamic Key Exchange in Wireless Networks [J]. Bell Labs Technical Journal, 2002, 7(2): 37–48.
Bellare M, Rogaway P. Entity Authentication and Key Distribution[C]//Proc of Crypto’93. New York: Springer-Verlag, 1994: 232.
Bellare M, Rogaway P. Provably Secure Session Key Distribution— the Three Party Case[C]//Proc of the ACM Symp on the Theory of Computing. New York: ACM Press, 1995: 57.
Canetti R, Krawczyk H. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels [C]//Proc of Eurocrypt’2001. Paris: Springer-Verlag, 2001: 453.
Lai X, Ma J. An 802.11i Robust Security Network Authentication Protocol of Roaming [J]. Chinese Journal of Computers, 2005, 28(12): 2027–2035 (Ch).
Yvonne H, Colin B. Tripartite Key Exchange in the Canetti-Krawczyk Proof Model [C]//Proc of Indorcypt’2004. Singapore: Springer-Verlag, 2004: 17.
Tin Y S T, Vasanta H, Boyd C, et al. Protocols with Security Proofs for Mobile Applications [C]//Proc of ACISP’2004. Berlin: Springer-Verlag, 2004: 358.
Li Yahui, Li Fenghua, Yang Weidong, et al. Provably Secure Authentication Protocol for Heterogeneous Wireless Networks[J]. Journal on Communications, 2007, 28(11): 21–29 (Ch).
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National High Technology Research and Development Program of China (2007AA01Z43)
Rights and permissions
About this article
Cite this article
Li, G., Wang, P. A new provably-secure key agreement protocol for roaming in mobile networks. Wuhan Univ. J. Nat. Sci. 13, 605–608 (2008). https://doi.org/10.1007/s11859-008-0519-0
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-008-0519-0