Please use this identifier to cite or link to this item:
|Title:||Security analysis on a conference scheme for mobile communications|
|Source:||Wan, Z., Bao, F., Deng, R.H., Ananda, A.L. (2006). Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 5 (6) : 1238-1240. ScholarBank@NUS Repository. https://doi.org/10.1109/TWC.2006.1638641|
|Abstract:||The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually obtain low power and limited computing capability. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content. © 2006 IEEE.|
|Source Title:||IEEE Transactions on Wireless Communications|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Dec 6, 2017
WEB OF SCIENCETM
checked on Nov 20, 2017
checked on Dec 10, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.