By Topic

Formal analysis of improved EAP-AKA based on Protocol Composition Logic

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Peng Liu ; Sch. of Comput. & Commun., Lanzhou Univ. of Technol., Lan''zhou, China ; Peng Zhou

A formal analysis based on PCL (Protocol Composition Logic) points out the vulnerability during the composition of EAP-AKA, and proposes an improved protocol EAP-AKA'. Based on DH protocol, the new protocol has session key secrecy, meanwhile, avoids the vulnerability to redirection attack and replay attack. Then a security analysis of the EAP-AKA' is made based on PCL, the analysis indicates that sub-protocols have SSA and key secrecy. According to the sequential rule, the precondition of a sub-protocol is preserved by the other one later in the chain, and each sub-protocol respects the invariant of the other, So EAP-AKA' is secure in the PCL mode.

Published in:

Future Computer and Communication (ICFCC), 2010 2nd International Conference on  (Volume:3 )

Date of Conference:

21-24 May 2010