Security analysis on "EAKE-WC: Authenticated Key Exchange Protocol for Wearable Computing"
Abstract
1 Introduction
Notation | Expansions |
Uj, WDi | jth user and ith wearable device of Uj |
RA | Registration authority |
PDNj | pseudo-identity of user |
IDj | Identity of jth user |
PWj | Uj Password |
MTj | jth mobile terminal |
PDNi, IDi | pseudo-identity and ith wearable device unique identity |
k | ASCON encryption/decryption key |
K | master secret key of Cloud server |
\(\mathcal {E^*_{\mathbb {A}}}\) | Adversary |
SK | Session key |
\(\mathbb {MAC}_i\) | Message Authentication code |
\(\mathbb {CT}_i\) | ith cipher text |
2 Revisit of Tu et al.’s protocol
2.1 Setup Phase
2.2 Registration Phase
2.3 Login and Authentication Phase
3 Crypt-analysis of Tu et al.’s Protocol
3.1 Attack Model
3.2 Violation of Anonymity
3.3 Password Guessing Attack
3.4 Uj Masquerading Attack
3.5 WDi Masquerading Attack
4 Probable Remedies to Enhance Security of Tu et al.’s Protocol
4.1 Remedy for Guessing Attacks
4.2 Remedy for WDi Masquerading
4.3 Remedy for Uj Masquerading
4.4 Remedy for Anonymity Violation
5 Conclusion
Acknowledgments
References
Index Terms
- Security analysis on "EAKE-WC: Authenticated Key Exchange Protocol for Wearable Computing"
Recommendations
Comments on “EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing”
In the above paper, Tu et al. proposed an efficient and anonymous authenticated key exchange scheme optimized for wearable computing environments, utilizing lightweight cryptographic primitives like XOR, ASCON, and hash functions. They claimed the ...
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12: Proceedings of the 10th international conference on Applied Cryptography and Network SecurityThis paper shows several security weaknesses of a Multi-Factor Authenticated Key Exchange (MK-AKE) protocol, proposed by Pointcheval and Zimmer at ACNS'08. The Pointcheval-Zimmer scheme was designed to combine three authentication factors in one system, ...
Security weaknesses of authenticated key agreement protocols
In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of Holbl et al. After the analysis, we found that Tan et al.@?s, Lim et al.@?s and two protocols of Holbl et al. are insecure against the impersonation attack and ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Natural Science Foundation of Shandong Province, China
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 112Total Downloads
- Downloads (Last 12 months)112
- Downloads (Last 6 weeks)39
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in