Please use this identifier to cite or link to this item:
|Title:||Security analysis on a conference scheme for mobile communications||Authors:||Wan, Z.
|Issue Date:||2006||Citation:||Wan, Z., Bao, F., Deng, R.H., Ananda, A.L. (2006). Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 5 (6) : 1238-1240. ScholarBank@NUS Repository. https://doi.org/10.1109/TWC.2006.1638641||Abstract:||The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually obtain low power and limited computing capability. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content. © 2006 IEEE.||Source Title:||IEEE Transactions on Wireless Communications||URI:||http://scholarbank.nus.edu.sg/handle/10635/42174||ISSN:||15361276||DOI:||10.1109/TWC.2006.1638641|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Jun 10, 2021
WEB OF SCIENCETM
checked on Jun 2, 2021
checked on Jun 11, 2021
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.