RAHMANI, Amir Masoud, Mokhtar MOHAMMADI, Shima RASHIDI, Jan LÁNSKÝ, Stanislava MILDEOVÁ, Masoumeh SAFKHANI, Saru KUMARI and Mehdi HOSSEINZADEH. Questioning the Security of Three Recent Authentication and Key Agreement Protocols. IEEE Access. USA: IEEE, 2021, vol. 2021, No 9, p. 98204-98217. ISSN 2169-3536. Available from: https://dx.doi.org/10.1109/ACCESS.2021.3094875.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Questioning the Security of Three Recent Authentication and Key Agreement Protocols
Name in Czech Zpochybnění bezpečnosti tří nedávných ověřovacích protokolů a klíčových dohod
Authors RAHMANI, Amir Masoud (guarantor), Mokhtar MOHAMMADI, Shima RASHIDI (203 Czech Republic), Jan LÁNSKÝ (203 Czech Republic, belonging to the institution), Stanislava MILDEOVÁ (203 Czech Republic, belonging to the institution), Masoumeh SAFKHANI, Saru KUMARI and Mehdi HOSSEINZADEH.
Edition IEEE Access, USA, IEEE, 2021, 2169-3536.
Other information
Original language English
Type of outcome Article in a journal
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
WWW URL
RIV identification code RIV/04274644:_____/21:#0000779
Organization unit University of Finance and Administration
Doi http://dx.doi.org/10.1109/ACCESS.2021.3094875
UT WoS 000673197900001
Keywords (in Czech) autentizace; IoV-SMAP; ultralehký protokol EGP; desynchronizační útok
Keywords in English authentication; IoV-SMAP; ultra-lightweight EGP protocol; desynchronization attack
Tags AR 2020-2021, odmeny_2022, POZNÁMKA, RIV_2022, xJ1
Tags International impact, Reviewed
Changed by Changed by: Bc. Jan Peterec, učo 24999. Changed: 8/3/2022 07:16.
Abstract
While we see many new proposals in the literature to secure communications on IoT systems, security analysis of those schemes has not received enough attention. Hence, the aim of the article is to analyse the security of three recently protocols for constrained environments and show their security loopholes. In this context the authors propose an efficient secret disclosure attack against Extremely Good Privacy.
Abstract (in Czech)
I když je v literatuře k vidění mnoho nových návrhů na zabezpečení komunikace v systémech IoT, bezpečnostní analýze těchto schémat nebyla věnována dostatečná pozornost. Cílem článku je analyzovat zabezpečení tří nedávno použitých protokolů a ukázat jejich bezpečnostní mezery. V této souvislosti je autory navržen účinný útok proti prolomení Extremely Good Privacy.
PrintDisplayed: 27/4/2024 18:58