Skip to main content
Log in

A Secure Key Agreement Protocol Defiant to Denial-of-Service Attack based on Three Party Authentication

  • Original Contribution
  • Published:
Journal of The Institution of Engineers (India): Series B Aims and scope Submit manuscript

Abstract

To perform the secure communication over the insecure channel, Key Agreement Protocol is a prominent approach to generate the session key between the communication parties. Since the last two decades, researchers came up with various ideas to design the Key Agreement Protocols based on three-party authentications. However, such proposed schemes could not resist many possible threats which may occur habitually in today’s environment. In the recent era, Chen et al. designed a key agreement protocol based on three-party key authentication to avoid numerous possible threats. Unfortunately, it has been proved that their protocol couldn’t achieve the user anonymity requirement and is also vulnerable towards Denial-of-service (DoS) attack. Therefore, in this paper, to overcome these weaknesses a probable solution has been provided. The proposed scheme is not only secured against the DoS attack and able to achieve user anonymity but also sustains against any possible threats as well. Later, a formal analysis of BAN (Burrows-Abadi-Needham) logic has been demonstrated to prove the correctness of the proposed protocol. Moreover, the informal security analysis of the proposed scheme has also explained and also proved the superiority of the scheme by comparing it with other related schemes. Lastly, the proposed scheme has been simulated using ProVerif (2.0) tool to verify the secrecy of the session key establishment and the mutual authentication between the participants.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Y.J. Choie, E. Jeong, E. Lee, Efficient identity-based authenticated key agreement protocol from pairings. Appl. Math. Comput. 162(1), 179–188 (2005)

    MathSciNet  MATH  Google Scholar 

  2. X. Cao, W. Kou, X. Du, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)

    Article  MathSciNet  Google Scholar 

  3. T.-Y. Wu, Y.-M. Tseng, An efficient user authentication and key exchange protocol for mobile client–server environment. Comput. Netw. 54(9), 1520–1530 (2010)

    Article  Google Scholar 

  4. G. Chen, Y. Mao, C.K. Chui, A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  Google Scholar 

  5. X.-Y. Wang, L. Yang, R. Liu, A. Kadir, A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)

    Article  MathSciNet  Google Scholar 

  6. L.J. Sheu, A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65(1–2), 103–108 (2011)

    Article  MathSciNet  Google Scholar 

  7. W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  8. M.S. Farash, S. Kumari, M. Bakhtiari, Cryptanalysis and improvement of a robust smart card secured authentication scheme on sip using elliptic curve cryptography. Multimed. Tools Appl. 75(8), 4485–4504 (2016)

    Article  Google Scholar 

  9. Q. Xie, A new authenticated key agreement for session initiation protocol. Int. J. Commun Syst 25(1), 47–54 (2012)

    Article  Google Scholar 

  10. D. Xiao, X. Liao, S. Deng, A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136–1142 (2007)

    Article  MathSciNet  Google Scholar 

  11. S. Han, Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764–768 (2008)

    Article  MathSciNet  Google Scholar 

  12. T. Xiang, K.-W. Wong, X. Liao, On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40(2), 672–675 (2007)

    Article  Google Scholar 

  13. D. Xiao, X. Liao, S. Deng, Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6), 1598–1602 (2008)

    Article  MathSciNet  Google Scholar 

  14. S. Han, E. Chang, Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fractals 39(3), 1283–1289 (2007)

    Article  MathSciNet  Google Scholar 

  15. H.R. Tseng, R.-H. Jan, W. Yang et al., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Conf. Commun. 2009, 1–6 (2009)

    Google Scholar 

  16. Y. Niu, X. Wang, An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986–1992 (2011)

    Article  MathSciNet  Google Scholar 

  17. E.-J. Yoon, Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735–2740 (2012)

    Article  MathSciNet  Google Scholar 

  18. K. Xue, P. Hong, Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969–2977 (2012)

    Article  MathSciNet  Google Scholar 

  19. Z. Tan, A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72(1–2), 311–320 (2013)

    Article  MathSciNet  Google Scholar 

  20. C.-C. Lee, C.-L. Chen, C.-Y. Wu, S.-Y. Huang, An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)

    Article  MathSciNet  Google Scholar 

  21. D. He, Y. Chen, J. Chen, Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)

    Article  MathSciNet  Google Scholar 

  22. X. Wang, J. Zhao, An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052–4057 (2010)

    Article  MathSciNet  Google Scholar 

  23. E.-J. Yoon, I.-S. Jeon, An efficient and secure diffie–hellman key agreement protocol based on chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383–2389 (2011)

    Article  MathSciNet  Google Scholar 

  24. H. Lai, J. Xiao, L. Li, Y. Yang, Applying semigroup property of enhanced chebyshev polynomials to anonymous authentication protocol”. Math. Problems Eng. (2012). https://doi.org/10.1155/2012/454823

    Article  MathSciNet  MATH  Google Scholar 

  25. F. Zhao, P. Gong, S. Li, M. Li, P. Li, Cryptanalysis and improvement of a three-party key agreement protocol using enhanced chebyshev polynomials. Nonlinear Dyn. 74(1–2), 419–427 (2013)

    Article  MathSciNet  Google Scholar 

  26. C.-C. Lee, C.-T. Li, C.-W. Hsu, A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73(1–2), 125–132 (2013)

    Article  MathSciNet  Google Scholar 

  27. Q. Xie, J. Zhao, X. Yu, Chaotic maps-based three-party password authenticated key agreement scheme. Nonlinear Dyn. 74(4), 1021–1027 (2013)

    Article  MathSciNet  Google Scholar 

  28. M.S. Farash, M.A. Attari, An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn. 77(1–2), 399–411 (2014)

    Article  MathSciNet  Google Scholar 

  29. X. Hu, Z. Zhang, Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol. Nonlinear Dyn. 78(2), 1293–1300 (2014)

    Article  Google Scholar 

  30. C.-C. Lee, C.-T. Li, S.-T. Chiu, Y.-M. Lai, A new three-party authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79(4), 2485–2495 (2015)

    Article  MathSciNet  Google Scholar 

  31. X. Li, J. Niu, S. Kumari, M.K. Khan, J. Liao, W. Liang, Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80(3), 1209–1220 (2015)

    Article  MathSciNet  Google Scholar 

  32. C.M. Chen, L. Xu, T.-Y. Wu, C.-R. Li, On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–65 (2016)

    Google Scholar 

  33. C.M. Chen, L. Xu, W. Fang, T.Y. Wu, A three-party password-authenticated key exchange protocol resistant to stolen smart card attacks. in Adv. in Intell. Info. Hiding and Multimedia Signal Processing (Springer, 2017), pp. 331–336

  34. S. Nag, S. Banerjee, Cryptanalysis of a three-party password-authenticated key exchange protocol resistant to stolen smart card attacks. in Sec. Int. Conf. on Electronic. Comm. and Aerosp. Technol. (ICECA) (IEEE, 2018), pp. 103–106

  35. A.O. Sharif, H. Arshad, M. Nikooghadam, D. Abbasinezhad-Mood, Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Futur. Gener. Comput. Syst. 100, 882–892 (2019)

    Article  Google Scholar 

  36. R. Amin, S.K.H. Islam, G.P. Biswas, M.K. Khan, L. Leng, Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 101, 42–62 (2016)

    Article  Google Scholar 

  37. Q. Jiang, S. Zeadally, J. Ma, D. He, Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)

    Article  Google Scholar 

  38. C.T. Chen, C.C. Lee, I.C. Lin, Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. PLoS ONE 15(4), e0232277 (2020)

    Article  Google Scholar 

  39. B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules. in IEEE Comput. Security Foundation Workshop (2001) pp. 0082–96

  40. M. Abadi, B. Blanchet, C. L. Hubert, Models and proofs of protocol security: a progress report. in Int. Conf. on Comput. Aided Verification (Springer, Berlin, Heidelberg, 2009), pp. 35-49

  41. D. Dolev, A.C. Yao, On the security of public key protocols. IEEE Trans. Inf. Theory 29, 198–208 (1983)

    Article  MathSciNet  Google Scholar 

Download references

Funding

No funding

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chukhu Chunka.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file1 (DOCX 17 kb)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chunka, C., Banerjee, S., Nag, S. et al. A Secure Key Agreement Protocol Defiant to Denial-of-Service Attack based on Three Party Authentication. J. Inst. Eng. India Ser. B 103, 329–340 (2022). https://doi.org/10.1007/s40031-021-00673-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40031-021-00673-8

Keywords

Navigation