ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks
Cited 3 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
윤택영, 이세원, 홍석희, 박영호
발행일
201406
출처
International Journal of Distributed Sensor Networks, v.2014, pp.1-6
ISSN
1550-1329
출판사
Hindawi Publishing
DOI
https://dx.doi.org/10.1155/2014/125309
협약과제
13SS1200, 미래 복합 컴퓨팅 환경에서의 데이터 프라이버시 강화 기술 개발, 장구영
초록
For enhancing the security of ubiquitous communication, we have to consider three keywords: mobility, wireless, and low computing capability. In this paper, we study one of suitable security protocols for the ubiquitous communication environment. We discuss RSA-based password-authenticated key exchange (RSA-PAKE) protocols for imbalanced wireless networks where a party uses a low-power device to communicate with another party equipped with a powerful computing device. For imbalanced wireless network applications, it is important to reduce the cost of communication for a low-power device even though the cost for powerful devices is increasing. The most power-consuming operation in RSA-PAKE protocols is the reliability test of unauthorized RSA public keys. Hence, it is important to design an efficient reliability test method to construct an efficient RSA-PAKE protocol. In this paper, we propose a new reliability test technique and design a provably secure RSA-PAKE protocol using the technique. Our protocol is suitable for securing the communications conducted over imbalanced wireless networks since the operations computed by one communicating party are efficient enough to be implemented on most low-power devices such as mobile phones and PDAs. The cost of a low-power device is reduced by 84.25% compared with CEKEP, the most efficient RSA-PAKE protocol. We prove the security of our protocol under a firmly formalized security model. © 2014 Taek-Young Youn et al.
KSP 제안 키워드
Communication Environment, Network applications, Password-authenticated key exchange, Provably secure, Security model, Wireless network, low-power device, mobile phone, reliability test, security protocol, test technique