Authenticated key agreement in wireless networks with automated key management

Naïm Qachri, Frédéric Lafitte, Olivier Markowitch

Résultats de recherche: Chapitre dans un livre, un rapport, des actes de conférencesContribution à une conférenceRevue par des pairs

Résumé

Authenticated key agreement protocols provide wireless technologies with fundamental mechanisms such as session key generation and device authentication. Many of these protocols have been designed specifically for those technologies, but most of them do not integrate all the security requirements, and others have been attacked. Another important issue that arises in practice is related to key management, since the deployement and replacement of keying material is costly and may potentially lead to security vulnerabilities. For these reasons, we propose a generic authenticated key agreement protocol in which the long term secret is automatically and periodically renewed. The focus of this work is to formally assess the security offered by the protocol's key renewing in the case of a long term use of the system. The formal analysis is carried using the automated tools ProVerif and AVISPA. The protocol is designed to rely only on symmetric key algorithms and is suitable for devices that have limited hardware capabilities.

langue originaleAnglais
titreSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
Pages62-69
Nombre de pages8
Les DOIs
étatPublié - 2013
Evénement6th International Conference on Security of Information and Networks, SIN 2013 - Aksaray, Turquie
Durée: 26 nov. 201328 nov. 2013

Série de publications

NomSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks

Une conférence

Une conférence6th International Conference on Security of Information and Networks, SIN 2013
Pays/TerritoireTurquie
La villeAksaray
période26/11/1328/11/13

Empreinte digitale

Examiner les sujets de recherche de « Authenticated key agreement in wireless networks with automated key management ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation