Please use this identifier to cite or link to this item:
|Title:||Security analysis on a conference scheme for mobile communications||Authors:||Wan, Z.
|Issue Date:||2006||Citation:||Wan, Z., Bao, F., Deng, R.H., Ananda, A.L. (2006). Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 5 (6) : 1238-1240. ScholarBank@NUS Repository. https://doi.org/10.1109/TWC.2006.1638641||Abstract:||The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually obtain low power and limited computing capability. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content. © 2006 IEEE.||Source Title:||IEEE Transactions on Wireless Communications||URI:||http://scholarbank.nus.edu.sg/handle/10635/42174||ISSN:||15361276||DOI:||10.1109/TWC.2006.1638641|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.