Abstract
There are important performance issues in secure wireless networks, such as mobility, power, bandwidth, and bit error rate (BER), that must be considered when designing a communication resume protocol. The efficiency of a secure session resume for a fast resume of secure communication is a key point in secure connection development. In this paper, a fast secure communication resume protocol using the initialization vector (IV) count for a secure wireless network is presented and evaluated against the efficiency of conventional resume protocols. Our proposed secure session resume protocol is found to achieve better performance, in terms of transmission traffic, consumed time, and BER, than conventional resume protocols with the same security capabilities.
Chapter PDF
References
WAP Forum. Wireless Transport Layer Security Spec., http://www.wapforum.org
Jormalainen, S., Laine, J.: Security in the WTLS, http://www.tml.hut.fi/Opinnot/Tik-110.501/1999/papers/wtls.htm
Karri, R., Mishra, P.: Optimizing the Energy Consumed by Secure Wireless Sessions-WTLS Case Study. In: Mobile Networks and Applications, vol. 8. Kluwer Academic Publishers, Dordrecht (2003)
Mikal, P.: WTLS: The Good and Bad of WAP Security (2001), http://www.advisor.com/Articles.nsf/aid/MIKAP001
Saarinen, M.-J.: Attacks against the WAP WTLS Protocol (1999), http://www.freeprotocols.org/harm0fWap/wtls.pdf
Badra, M., et al.: A New Secure Session Exchange Key Protocol for Wireless Communication. In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (2003)
Rahman, M.G., Imai, H.: Security in Wireless Communications. In: Wireless Personal Communications, vol. 22. Kluwer Academic Publishers, Dordrecht (2002)
Jo, H.S., Youn, H.Y.: A New Synchronization Protocol for Authentication in Wireless LAN Environment. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 711–721. Springer, Heidelberg (2004)
Hwang, M.S., et al.: On the Security of an Enhanced Authentication Key Exchange Protocol. In: AINA 2004. LNCS. Springer, Heidelberg (2004)
Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization Weakness in Synchronous Stream Ciphers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 159–167. Springer, Heidelberg (1994)
Nichols, R.K., Lekks, P.C.: Wireless Security - Models, Threats, and Solutions. McGraw-Hill Telecom, New York (2002)
Amoroso, E.: Fundamentals of Computer Security Technology. PTR Prentice Hall, Englewood Cliffs (1993)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons Inc., Chichester (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kim, K., Hong, J., Lim, J. (2005). A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. In: Kutvonen, L., Alonistioti, N. (eds) Distributed Applications and Interoperable Systems. DAIS 2005. Lecture Notes in Computer Science, vol 3543. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11498094_15
Download citation
DOI: https://doi.org/10.1007/11498094_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26262-6
Online ISBN: 978-3-540-31582-7
eBook Packages: Computer ScienceComputer Science (R0)