TY - GEN
T1 - Authenticated key agreement in wireless networks with automated key management
AU - Qachri, Naïm
AU - Lafitte, Frédéric
AU - Markowitch, Olivier
PY - 2013
Y1 - 2013
N2 - Authenticated key agreement protocols provide wireless technologies with fundamental mechanisms such as session key generation and device authentication. Many of these protocols have been designed specifically for those technologies, but most of them do not integrate all the security requirements, and others have been attacked. Another important issue that arises in practice is related to key management, since the deployement and replacement of keying material is costly and may potentially lead to security vulnerabilities. For these reasons, we propose a generic authenticated key agreement protocol in which the long term secret is automatically and periodically renewed. The focus of this work is to formally assess the security offered by the protocol's key renewing in the case of a long term use of the system. The formal analysis is carried using the automated tools ProVerif and AVISPA. The protocol is designed to rely only on symmetric key algorithms and is suitable for devices that have limited hardware capabilities.
AB - Authenticated key agreement protocols provide wireless technologies with fundamental mechanisms such as session key generation and device authentication. Many of these protocols have been designed specifically for those technologies, but most of them do not integrate all the security requirements, and others have been attacked. Another important issue that arises in practice is related to key management, since the deployement and replacement of keying material is costly and may potentially lead to security vulnerabilities. For these reasons, we propose a generic authenticated key agreement protocol in which the long term secret is automatically and periodically renewed. The focus of this work is to formally assess the security offered by the protocol's key renewing in the case of a long term use of the system. The formal analysis is carried using the automated tools ProVerif and AVISPA. The protocol is designed to rely only on symmetric key algorithms and is suitable for devices that have limited hardware capabilities.
KW - Cryptoperiod
KW - Key agreement protocol
KW - Mutual authentication
KW - Wireless communication security
UR - http://www.scopus.com/inward/record.url?scp=84893248336&partnerID=8YFLogxK
U2 - 10.1145/2523514.2523527
DO - 10.1145/2523514.2523527
M3 - Conference contribution
AN - SCOPUS:84893248336
SN - 9781450324984
T3 - SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
SP - 62
EP - 69
BT - SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
T2 - 6th International Conference on Security of Information and Networks, SIN 2013
Y2 - 26 November 2013 through 28 November 2013
ER -