Common Contracts

2 similar Authenticated Key Agreement Scheme contracts

Authenticated Key Agreement Scheme with Forward Secrecy for Wireless Sensor Networks
Authenticated Key Agreement Scheme • December 2nd, 2015

To establish secure communication, authenticated key agreement, which combines user authentication and key agreement, is the basic services for many security and privacy services over wireless sensor networks (WSNs). Recently, Jiang et al. proposed an efficient authenticated key agreement scheme with unlinkability for WSNs. Unfortunately, this paper shows two weaknesses in Jiang et al.’s scheme, which are the problem of global time synchronization requirement and the lack of forward secrecy. After that, this paper proposes an enhanced authenticated key agreement scheme with forward secrecy to remedy Jiang et al.’s scheme. The proposed scheme does not use timestamp that requires the global time synchronization and provides forward secrecy. It provides user anonymity and un-traceability by adopting dynamic identifier depending on each session dependent random number.

AutoNDA by SimpleDocs
Authenticated Key Agreement Scheme with Forward Secrecy for Wireless Sensor Networks
Authenticated Key Agreement Scheme • December 2nd, 2015

To establish secure communication, authenticated key agreement, which combines user authentication and key agreement, is the basic services for many security and privacy services over wireless sensor networks (WSNs). Recently, Jiang et al. proposed an efficient authenticated key agreement scheme with unlinkability for WSNs. Unfortunately, this paper shows two weaknesses in Jiang et al.’s scheme, which are the problem of global time synchronization requirement and the lack of forward secrecy. After that, this paper proposes an enhanced authenticated key agreement scheme with forward secrecy to remedy Jiang et al.’s scheme. The proposed scheme does not use timestamp that requires the global time synchronization and provides forward secrecy. It provides user anonymity and un-traceability by adopting dynamic identifier depending on each session dependent random number.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!