Abstract
In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park's two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park's protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client's identity. In this paper, we propose two protocols require less exchanged messages than Juang's protocols. In addition to this advantage, we point out that the identity protection of Juang's protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol.
Original language | English |
---|---|
Pages (from-to) | 213-223 |
Number of pages | 11 |
Journal | Computers and Electrical Engineering |
Volume | 36 |
Issue number | 1 |
DOIs | |
Publication status | Published - 2010 Jan |
Externally published | Yes |
Keywords
- Authenticated key exchange
- Identity protection
- Password
- Secure token
ASJC Scopus subject areas
- Control and Systems Engineering
- Computer Science(all)
- Electrical and Electronic Engineering