Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

Yunho Lee, Seung-Joo Kim, Dongho Won

Research output: Contribution to journalArticle

20 Citations (Scopus)

Abstract

In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park's two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park's protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client's identity. In this paper, we propose two protocols require less exchanged messages than Juang's protocols. In addition to this advantage, we point out that the identity protection of Juang's protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol.

Original languageEnglish
Pages (from-to)213-223
Number of pages11
JournalComputers and Electrical Engineering
Volume36
Issue number1
DOIs
Publication statusPublished - 2010 Jan 1
Externally publishedYes

Fingerprint

Local area networks
Network protocols
Glossaries
Servers

Keywords

  • Authenticated key exchange
  • Identity protection
  • Password
  • Secure token

ASJC Scopus subject areas

  • Computer Science(all)
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. / Lee, Yunho; Kim, Seung-Joo; Won, Dongho.

In: Computers and Electrical Engineering, Vol. 36, No. 1, 01.01.2010, p. 213-223.

Research output: Contribution to journalArticle

@article{6740619e3a10488db36ff1123388bf0d,
title = "Enhancement of two-factor authenticated key exchange protocols in public wireless LANs",
abstract = "In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park's two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park's protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client's identity. In this paper, we propose two protocols require less exchanged messages than Juang's protocols. In addition to this advantage, we point out that the identity protection of Juang's protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol.",
keywords = "Authenticated key exchange, Identity protection, Password, Secure token",
author = "Yunho Lee and Seung-Joo Kim and Dongho Won",
year = "2010",
month = "1",
day = "1",
doi = "10.1016/j.compeleceng.2009.08.007",
language = "English",
volume = "36",
pages = "213--223",
journal = "Computers and Electrical Engineering",
issn = "0045-7906",
publisher = "Elsevier Limited",
number = "1",

}

TY - JOUR

T1 - Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

AU - Lee, Yunho

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2010/1/1

Y1 - 2010/1/1

N2 - In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park's two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park's protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client's identity. In this paper, we propose two protocols require less exchanged messages than Juang's protocols. In addition to this advantage, we point out that the identity protection of Juang's protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol.

AB - In 2008, Juang and Wu proposed two authenticated key exchange protocols by improving Park and Park's two-factor authenticated key exchange protocol in public wireless LANs. They pointed out that Park's protocol was vulnerable to the dictionary attack on the identity protection. The improved protocols requires fewer exchanged messages and provided more secure protection for the client's identity. In this paper, we propose two protocols require less exchanged messages than Juang's protocols. In addition to this advantage, we point out that the identity protection of Juang's protocol is computationally inefficient for the server and efficient identity protection is proposed in the second proposed protocol.

KW - Authenticated key exchange

KW - Identity protection

KW - Password

KW - Secure token

UR - http://www.scopus.com/inward/record.url?scp=72449211714&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=72449211714&partnerID=8YFLogxK

U2 - 10.1016/j.compeleceng.2009.08.007

DO - 10.1016/j.compeleceng.2009.08.007

M3 - Article

AN - SCOPUS:72449211714

VL - 36

SP - 213

EP - 223

JO - Computers and Electrical Engineering

JF - Computers and Electrical Engineering

SN - 0045-7906

IS - 1

ER -