Secure key agreement protocol defiant to denial-of-service attack based on three party authentication (Record no. 17531)

000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220915134110.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220915b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 17911
Author Chunka, Chukhu
245 ## - TITLE STATEMENT
Title Secure key agreement protocol defiant to denial-of-service attack based on three party authentication
250 ## - EDITION STATEMENT
Volume, Issue number Vol.103(2), Apr
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York
Name of publisher, distributor, etc. Springer
Year 2022
300 ## - PHYSICAL DESCRIPTION
Pagination 329–340p.
520 ## - SUMMARY, ETC.
Summary, etc. To perform the secure communication over the insecure channel, Key Agreement Protocol is a prominent approach to generate the session key between the communication parties. Since the last two decades, researchers came up with various ideas to design the Key Agreement Protocols based on three-party authentications. However, such proposed schemes could not resist many possible threats which may occur habitually in today’s environment. In the recent era, Chen et al. designed a key agreement protocol based on three-party key authentication to avoid numerous possible threats. Unfortunately, it has been proved that their protocol couldn’t achieve the user anonymity requirement and is also vulnerable towards Denial-of-service (DoS) attack. Therefore, in this paper, to overcome these weaknesses a probable solution has been provided. The proposed scheme is not only secured against the DoS attack and able to achieve user anonymity but also sustains against any possible threats as well. Later, a formal analysis of BAN (Burrows-Abadi-Needham) logic has been demonstrated to prove the correctness of the proposed protocol. Moreover, the informal security analysis of the proposed scheme has also explained and also proved the superiority of the scheme by comparing it with other related schemes. Lastly, the proposed scheme has been simulated using ProVerif (2.0) tool to verify the secrecy of the session key establishment and the mutual authentication between the participants.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4642
Topical term or geographic name entry element Humanities and Applied Sciences
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 17527
Co-Author Banerjee, Subhasish
773 0# - HOST ITEM ENTRY
Title Journal of the institution of engineers (India): Series B
International Standard Serial Number 2250-2106
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://link.springer.com/article/10.1007/s40031-021-00673-8
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Barcode Date last seen Price effective from Koha item type
          School of Engineering & Technology School of Engineering & Technology Archieval Section 2022-09-15 2022-1599 2022-09-15 2022-09-15 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha