透過您的圖書館登入
IP:3.143.228.40
  • 期刊

Elliptic Curve Cryptography Based Wireless Authentication Protocol

並列摘要


Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-in-the-middle attack from the attacker within the system and proposed a user authentication protocol to prevent the attack. This paper further shows that Aydos et al.'s protocol is vulnerable to man-in-the-middle attack from any attacker not restricted on the inside attacker. Then, a forging certificate attack on Mangipudi et al's protocol is presented. Next, the reasons that Aydos et al's protocol and Mangipudi et al's protocol suffer the attacks are analyzed. Finally, we propose a novel ECC-based wireless authentication protocol and analyze the security of our protocol.

被引用紀錄


Tsai, J. S. (2011). 感知無線電頻譜偵測與傳輸之聯合最佳化 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2011.01339
Hui, W. L. (2010). 渥滋華斯之視覺光學世界:笛卡兒機械論、圓、體轉、性能、與零點引力 <<序曲>>與<<抒情歌謠>> [doctoral dissertation, National Taiwan Normal University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0021-1610201315203563
李嘉泓(2013)。探討語音驗證碼之設計對聽覺選擇性注意力之影響〔碩士論文,朝陽科技大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0078-2712201314042742

延伸閱讀