A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is
Aydos, Savas and Koç proposed a wireless authentication and key agreement protocol (ASK-WAP) based on Elliptic Curve Cryptography (ECC). We find that this protocol is vulnerable to a man-in-the-middle attack, a denial-of-service attack and an impersonation attack. In this paper, we present the above mentioned attacks on the ASK-WAP. We also propose a variant of ASK-WAP, the User Authentication Protocol (UAP) so that it resists these attacks. Furthermore, we analyze the security and performancedoi:10.1109/glocom.2004.1378405 dblp:conf/globecom/MangipudiMKF04 fatcat:4zcu4c5tw5f77ny7vvysxhhwdy