Authenticated key agreement in wireless networks with automated key management

Naïm Qachri, Frédéric Lafitte, Olivier Markowitch

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Authenticated key agreement protocols provide wireless technologies with fundamental mechanisms such as session key generation and device authentication. Many of these protocols have been designed specifically for those technologies, but most of them do not integrate all the security requirements, and others have been attacked. Another important issue that arises in practice is related to key management, since the deployement and replacement of keying material is costly and may potentially lead to security vulnerabilities. For these reasons, we propose a generic authenticated key agreement protocol in which the long term secret is automatically and periodically renewed. The focus of this work is to formally assess the security offered by the protocol's key renewing in the case of a long term use of the system. The formal analysis is carried using the automated tools ProVerif and AVISPA. The protocol is designed to rely only on symmetric key algorithms and is suitable for devices that have limited hardware capabilities.

Original languageEnglish
Title of host publicationSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
Pages62-69
Number of pages8
DOIs
Publication statusPublished - 2013
Event6th International Conference on Security of Information and Networks, SIN 2013 - Aksaray, Turkey
Duration: 26 Nov 201328 Nov 2013

Publication series

NameSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks

Conference

Conference6th International Conference on Security of Information and Networks, SIN 2013
Country/TerritoryTurkey
CityAksaray
Period26/11/1328/11/13

Keywords

  • Cryptoperiod
  • Key agreement protocol
  • Mutual authentication
  • Wireless communication security

Fingerprint

Dive into the research topics of 'Authenticated key agreement in wireless networks with automated key management'. Together they form a unique fingerprint.

Cite this