Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol

K. Mangipudi, N. Malneedi, R. Katti, Huirong Fu
IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.  
Aydos, Savas and Koç proposed a wireless authentication and key agreement protocol (ASK-WAP) based on Elliptic Curve Cryptography (ECC). We find that this protocol is vulnerable to a man-in-the-middle attack, a denial-of-service attack and an impersonation attack. In this paper, we present the above mentioned attacks on the ASK-WAP. We also propose a variant of ASK-WAP, the User Authentication Protocol (UAP) so that it resists these attacks. Furthermore, we analyze the security and performance
more » ... ty and performance of the proposed UAP. The results show that our proposed UAP is much more secured and is also efficient with few message exchanges and less computations.
doi:10.1109/glocom.2004.1378405 dblp:conf/globecom/MangipudiMKF04 fatcat:4zcu4c5tw5f77ny7vvysxhhwdy