ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks
Cited 3 time in scopus Download 10 time Share share facebook twitter linkedin kakaostory
Authors
Taek-Young Youn, Sewon Lee, Seok Hie Hong, Young-Ho Park
Issue Date
2014-06
Citation
International Journal of Distributed Sensor Networks, v.2014, pp.1-6
ISSN
1550-1329
Publisher
Hindawi Publishing
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1155/2014/125309
Abstract
For enhancing the security of ubiquitous communication, we have to consider three keywords: mobility, wireless, and low computing capability. In this paper, we study one of suitable security protocols for the ubiquitous communication environment. We discuss RSA-based password-authenticated key exchange (RSA-PAKE) protocols for imbalanced wireless networks where a party uses a low-power device to communicate with another party equipped with a powerful computing device. For imbalanced wireless network applications, it is important to reduce the cost of communication for a low-power device even though the cost for powerful devices is increasing. The most power-consuming operation in RSA-PAKE protocols is the reliability test of unauthorized RSA public keys. Hence, it is important to design an efficient reliability test method to construct an efficient RSA-PAKE protocol. In this paper, we propose a new reliability test technique and design a provably secure RSA-PAKE protocol using the technique. Our protocol is suitable for securing the communications conducted over imbalanced wireless networks since the operations computed by one communicating party are efficient enough to be implemented on most low-power devices such as mobile phones and PDAs. The cost of a low-power device is reduced by 84.25% compared with CEKEP, the most efficient RSA-PAKE protocol. We prove the security of our protocol under a firmly formalized security model. © 2014 Taek-Young Youn et al.
KSP Keywords
Communication Environment, Low-Power Devices, Network applications, Password-authenticated key exchange, Provably secure, Security model, Wireless network, mobile phone, reliability test, security protocol, test technique
This work is distributed under the term of Creative Commons License (CCL)
(CC BY)
CC BY