In this work, we have identified a class of weakness named as insider-replay attack in a number of existing protocols and propose a common design principle to avoid the weakness. Also, based on the design principles, we propose three key establishment schemes under two different scenarios. The proposed schemes are efficient in terms of number of nonce used and are based on one-way functions.
CITATION STYLE
Saha, M., & RoyChowdhury, D. (2006). Design of key establishment protocol using one-way functions to avert insider-replay attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4332 LNCS, pp. 194–204). Springer Verlag. https://doi.org/10.1007/11961635_13
Mendeley helps you to discover research relevant for your work.