2 research outputs found
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively
defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication
attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile user and the accessed
VLR. Fortunately, we improve its security in this paper
Enhancement the security of WSN using ALARM protocol to Prevention from Reply Attack
The wireless Ad hoc network is the self configuring type of network. In self configuring type of networks mobile nodes can leave or join the network when they want .In such type of networks many inside and outside attacks are possible. Inside and outside attacks are broadly classified as active and passive attacks. To prevent inside and outside attacks trust relationship between the mobile nodes must be maintained. The trust relationship between the mobile nodes is provided by mutual authentication. ALARM is the protocol for providing trust relationship between the mobile nodes. In this protocol the clocks of the mobile nodes are weakly synchronized by using GPS. In such case reply attack is possible. To prevent reply attack clocks of the mobile nodes must be strongly synchronized. In our new proposed technique, we are enhancing t the ALARM protocol to provide strong clock synchronization between the mobile nodes. Our new technique will be based on the NTP (network time protocol). Keywords— ALARM, Attacks, clock Synchronization, GPS, NT