Session Key Agreement for End-to-End Security in Time-Synchronized Networks

Author(s):  
Qinghua Wang ◽  
Xin Huang ◽  
Dawit Mengistu
2020 ◽  
Vol 69 (8) ◽  
pp. 8914-8924 ◽  
Author(s):  
Jie Cui ◽  
Yali Wang ◽  
Jing Zhang ◽  
Yan Xu ◽  
Hong Zhong

2018 ◽  
Vol 18 (4) ◽  
pp. 61-74 ◽  
Author(s):  
S. Usha ◽  
S. Kuppuswami ◽  
M. Karthik

Abstract Cryptographic protocols are the backbone of information security. Unfortunately the security of several important components of these protocols can be neglected. This causes violation of personal privacy and threats to democracy. Integration of biometrics with cryptography can overcome this problem. In this paper an enhanced session key agreement protocol which uses the data derived from iris signature is suggested to improve the security of biometric based applications like e-Passport, e-Driving license, etc. The authenticity and security properties of the proposed protocol are analyzed using ProVerif tool and demonstrate it satisfies the intended properties.


Author(s):  
Preeti Chandrakar ◽  
Hari Om

In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement protocol. As they have shown in the presented scheme, is precise and secure according to both formal and informal security analysis. For formal security analysis, they have applied BAN (Burrows-Abadi-Needham) logic which certifies that the presented scheme provides the amenity of mutual authentication and session key agreement safely. The informal security verification has shown that the proposed scheme is more vigorous against various sort of cruel threats. Moreover, the authors have simulated the presented scheme using broadly accepted AVISPA tool, whose simulation results make sure that the protocol is not dangerous from active and passive attacks together with replay and man-in-the-middle attacks. In addition, the performance evaluation and the security comparison have revealed that the presented scheme gives strong security as well as better complexity in the context of smart card memory requirement, communication cost and computation cost.


2021 ◽  
Author(s):  
Zhonglin Ding ◽  
Yang Hu ◽  
Wei Luo ◽  
Zhongming Huang ◽  
Jintao Xue ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document