TY - JOUR
T1 - A mutual authentication protocol with resynchronisation capability for mobile satellite communications
AU - Lasc, Ioana
AU - Dojen, Reiner
AU - Coffey, Tom
PY - 2011
Y1 - 2011
N2 - Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of service condition. A case study demonstrates the effectiveness of desynchronisation attacks against a security protocol for mobile satellite communications. A new mutual authentication protocol for satellite communications, incorporating a resynchronisation capability, is proposed to counter the disruptive effects of desynchronisation attacks. The new protocol has an esynchronisation phase that is initiated whenever desynchronisation is suspected. Thus, the possibility of causing permanent denial of service conditions by mounting desynchronisation attacks is eliminated. A security analysis of the proposed protocol establishes its resistance against attacks like replay attacks, dictionary attacks, and desynchronisation attacks.
AB - Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of service condition. A case study demonstrates the effectiveness of desynchronisation attacks against a security protocol for mobile satellite communications. A new mutual authentication protocol for satellite communications, incorporating a resynchronisation capability, is proposed to counter the disruptive effects of desynchronisation attacks. The new protocol has an esynchronisation phase that is initiated whenever desynchronisation is suspected. Thus, the possibility of causing permanent denial of service conditions by mounting desynchronisation attacks is eliminated. A security analysis of the proposed protocol establishes its resistance against attacks like replay attacks, dictionary attacks, and desynchronisation attacks.
KW - Authentication
KW - Denial of service
KW - Desynchronisation attacks
KW - Security protocols
KW - Wireless communications
UR - http://www.scopus.com/inward/record.url?scp=79956109499&partnerID=8YFLogxK
U2 - 10.4018/jisp.2011010103
DO - 10.4018/jisp.2011010103
M3 - Article
AN - SCOPUS:79956109499
SN - 1930-1650
VL - 5
SP - 33
EP - 49
JO - International Journal of Information Security and Privacy
JF - International Journal of Information Security and Privacy
IS - 1
ER -