Publication Type

Journal Article

Version

publishedVersion

Publication Date

6-2006

Abstract

The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a difficult task because wireless networks are more susceptible to attacks and mobile devices usually obtain low power and limited computing capability. In this paper we study a conference scheme for mobile communications and find that the scheme is insecure against the replay attack. With our replay attack, an attacker with a compromised conference key can cause the conferees to reuse the compromised conference key, which in turn completely reveals subsequent conversation content

Keywords

conference key distribution scheme, conference scheme, mobile communications, replay attack, security analysis

Discipline

Information Security

Research Areas

Cybersecurity

Publication

IEEE Transactions on Wireless Communications

Volume

5

Issue

6

First Page

1238

Last Page

1240

ISSN

1536-1276

Identifier

10.1109/TWC.2006.1638641

Publisher

IEEE

Copyright Owner and License

Authors

Additional URL

https://doi.org/10.1109/TWC.2006.1638641

Share

COinS