Skip to main content

Novel Three-Party Password-Based Authenticated Key Exchange Protocol for Wireless Sensor Networks

  • Conference paper
  • 3238 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 334))

Abstract

Despite recent improvements of the capabilities of wireless sensors, network protocol support for key exchange is still lagging behind. Three-party password-based authenticated key exchange protocols allow sensors communicate over an open network securely using high entropy session keys originated from a low entropy password. Due to their convenience in building a secure communication channel, many password-based key exchange protocols have been proposed and investigated over the years. Nevertheless, protocol must be designed carefully so as not to be broken using dictionary attacks in which an adversary tries all possible passwords in an attempt to figure out the correct one. Besides, protocol must be environment-friendly. That is say, the protocol should not pose too much loads on wireless sensors. And hence, a novel 3PAKE protocol is proposed for wireless sensor networks, which has better performance compared with similar protocols.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Steiner, M., Tsudik, G., Waidner, M.: Refinement and extension of encrypted key exchange. ACM Operating Systems Review 29(3), 22–30 (1995)

    Article  Google Scholar 

  2. Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM Operating Systems Review 29(4), 77–86 (1995)

    Article  Google Scholar 

  3. Hamed, A.I., El-Khamy, S.E.: New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve Cryptography. In: 2009 National Radio Science Conference: NRSC 2009, vol. 1, 2, pp. 454–466 (2009)

    Google Scholar 

  4. Deng, M., Huang, Z., Lu, Z.: Authenticated key exchange protocol for medical sensor network. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) 38(8), 69–72 (2010)

    MathSciNet  Google Scholar 

  5. Lee, T.F., Hwang, T., Lin, C.L.: Enhanced three-party encrypted key exchange without server’s public keys. Computers and Security 23(7), 571–577 (2004)

    Article  Google Scholar 

  6. Le Xuan, H., Lee, S., Lee, L.K.: A key-exchanging scheme for distributed sensor networks. In: Intelligence in Communication Systems, pp. 271–279 (2005)

    Google Scholar 

  7. Lu, R., Cao, Z.: Simple three-party key exchange protocol. Computers & Security 26(1), 94–97 (2007)

    Article  Google Scholar 

  8. Chang, T.F.: A practical three-party key exchange protocol with round efficiency. International Journal of Innovative Computing, Information and Control 4(4), 953–960 (2008)

    Google Scholar 

  9. Lee, T., Hwang, T.: Simple password-based three-party authenticated key exchange without server public keys. Information Sciences 180(9), 1702–1714 (2010)

    Article  MATH  Google Scholar 

  10. Lin, C., Hwang, T.: On a simple three-party password-based key exchange protocol. International Journal of Communication Systems 24(11), 1520–1532 (2011)

    Article  Google Scholar 

  11. Tian, X., Wong, D.S., Zhu, R.W.: Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications Letters 9(11), 970–972 (2005)

    Article  Google Scholar 

  12. Chang, T., Hwang, M., Yang, W.: A communication-efficient three-party password authenticated key exchange protocol. Information Sciences 181(1), 217–226 (2011)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, Q., Wang, Y., Shao, X., Yang, F., Wang, R. (2013). Novel Three-Party Password-Based Authenticated Key Exchange Protocol for Wireless Sensor Networks. In: Wang, R., Xiao, F. (eds) Advances in Wireless Sensor Networks. CWSN 2012. Communications in Computer and Information Science, vol 334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36252-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36252-1_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36251-4

  • Online ISBN: 978-3-642-36252-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics