Abstract
To perform the secure communication over the insecure channel, Key Agreement Protocol is a prominent approach to generate the session key between the communication parties. Since the last two decades, researchers came up with various ideas to design the Key Agreement Protocols based on three-party authentications. However, such proposed schemes could not resist many possible threats which may occur habitually in today’s environment. In the recent era, Chen et al. designed a key agreement protocol based on three-party key authentication to avoid numerous possible threats. Unfortunately, it has been proved that their protocol couldn’t achieve the user anonymity requirement and is also vulnerable towards Denial-of-service (DoS) attack. Therefore, in this paper, to overcome these weaknesses a probable solution has been provided. The proposed scheme is not only secured against the DoS attack and able to achieve user anonymity but also sustains against any possible threats as well. Later, a formal analysis of BAN (Burrows-Abadi-Needham) logic has been demonstrated to prove the correctness of the proposed protocol. Moreover, the informal security analysis of the proposed scheme has also explained and also proved the superiority of the scheme by comparing it with other related schemes. Lastly, the proposed scheme has been simulated using ProVerif (2.0) tool to verify the secrecy of the session key establishment and the mutual authentication between the participants.
Similar content being viewed by others
References
Y.J. Choie, E. Jeong, E. Lee, Efficient identity-based authenticated key agreement protocol from pairings. Appl. Math. Comput. 162(1), 179–188 (2005)
X. Cao, W. Kou, X. Du, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)
T.-Y. Wu, Y.-M. Tseng, An efficient user authentication and key exchange protocol for mobile client–server environment. Comput. Netw. 54(9), 1520–1530 (2010)
G. Chen, Y. Mao, C.K. Chui, A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
X.-Y. Wang, L. Yang, R. Liu, A. Kadir, A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)
L.J. Sheu, A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)
W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
M.S. Farash, S. Kumari, M. Bakhtiari, Cryptanalysis and improvement of a robust smart card secured authentication scheme on sip using elliptic curve cryptography. Multimed. Tools Appl. 75(8), 4485–4504 (2016)
Q. Xie, A new authenticated key agreement for session initiation protocol. Int. J. Commun Syst 25(1), 47–54 (2012)
D. Xiao, X. Liao, S. Deng, A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)
S. Han, Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764–768 (2008)
T. Xiang, K.-W. Wong, X. Liao, On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40(2), 672–675 (2007)
D. Xiao, X. Liao, S. Deng, Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6), 1598–1602 (2008)
S. Han, E. Chang, Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 1283–1289 (2007)
H.R. Tseng, R.-H. Jan, W. Yang et al., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Conf. Commun. 2009, 1–6 (2009)
Y. Niu, X. Wang, An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)
E.-J. Yoon, Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)
K. Xue, P. Hong, Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)
Z. Tan, A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72(1–2), 311–320 (2013)
C.-C. Lee, C.-L. Chen, C.-Y. Wu, S.-Y. Huang, An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
D. He, Y. Chen, J. Chen, Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)
X. Wang, J. Zhao, An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)
E.-J. Yoon, I.-S. Jeon, An efficient and secure diffie–hellman key agreement protocol based on chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383–2389 (2011)
H. Lai, J. Xiao, L. Li, Y. Yang, Applying semigroup property of enhanced chebyshev polynomials to anonymous authentication protocol”. Math. Problems Eng. (2012). https://doi.org/10.1155/2012/454823
F. Zhao, P. Gong, S. Li, M. Li, P. Li, Cryptanalysis and improvement of a three-party key agreement protocol using enhanced chebyshev polynomials. Nonlinear Dyn. 74(1–2), 419–427 (2013)
C.-C. Lee, C.-T. Li, C.-W. Hsu, A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73(1–2), 125–132 (2013)
Q. Xie, J. Zhao, X. Yu, Chaotic maps-based three-party password authenticated key agreement scheme. Nonlinear Dyn. 74(4), 1021–1027 (2013)
M.S. Farash, M.A. Attari, An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn. 77(1–2), 399–411 (2014)
X. Hu, Z. Zhang, Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol. Nonlinear Dyn. 78(2), 1293–1300 (2014)
C.-C. Lee, C.-T. Li, S.-T. Chiu, Y.-M. Lai, A new three-party authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79(4), 2485–2495 (2015)
X. Li, J. Niu, S. Kumari, M.K. Khan, J. Liao, W. Liang, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80(3), 1209–1220 (2015)
C.M. Chen, L. Xu, T.-Y. Wu, C.-R. Li, On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–65 (2016)
C.M. Chen, L. Xu, W. Fang, T.Y. Wu, A three-party password-authenticated key exchange protocol resistant to stolen smart card attacks. in Adv. in Intell. Info. Hiding and Multimedia Signal Processing (Springer, 2017), pp. 331–336
S. Nag, S. Banerjee, Cryptanalysis of a three-party password-authenticated key exchange protocol resistant to stolen smart card attacks. in Sec. Int. Conf. on Electronic. Comm. and Aerosp. Technol. (ICECA) (IEEE, 2018), pp. 103–106
A.O. Sharif, H. Arshad, M. Nikooghadam, D. Abbasinezhad-Mood, Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Futur. Gener. Comput. Syst. 100, 882–892 (2019)
R. Amin, S.K.H. Islam, G.P. Biswas, M.K. Khan, L. Leng, Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 101, 42–62 (2016)
Q. Jiang, S. Zeadally, J. Ma, D. He, Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)
C.T. Chen, C.C. Lee, I.C. Lin, Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. PLoS ONE 15(4), e0232277 (2020)
B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules. in IEEE Comput. Security Foundation Workshop (2001) pp. 0082–96
M. Abadi, B. Blanchet, C. L. Hubert, Models and proofs of protocol security: a progress report. in Int. Conf. on Comput. Aided Verification (Springer, Berlin, Heidelberg, 2009), pp. 35-49
D. Dolev, A.C. Yao, On the security of public key protocols. IEEE Trans. Inf. Theory 29, 198–208 (1983)
Funding
No funding
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Below is the link to the electronic supplementary material.
Rights and permissions
About this article
Cite this article
Chunka, C., Banerjee, S., Nag, S. et al. A Secure Key Agreement Protocol Defiant to Denial-of-Service Attack based on Three Party Authentication. J. Inst. Eng. India Ser. B 103, 329–340 (2022). https://doi.org/10.1007/s40031-021-00673-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40031-021-00673-8