Lee-Lee-Kim-Jeong proposed a hybrid authentication scheme to alleviate the latent security problems of mobile multi-hop networks. In this letter, we show that the Lee-Lee-Kim-Jeong scheme is insecure against the intercept attack.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Haeryong PARK, "Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme" in IEICE TRANSACTIONS on Communications,
vol. E93-B, no. 4, pp. 1013-1015, April 2010, doi: 10.1587/transcom.E93.B.1013.
Abstract: Lee-Lee-Kim-Jeong proposed a hybrid authentication scheme to alleviate the latent security problems of mobile multi-hop networks. In this letter, we show that the Lee-Lee-Kim-Jeong scheme is insecure against the intercept attack.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E93.B.1013/_p
Copy
@ARTICLE{e93-b_4_1013,
author={Haeryong PARK, },
journal={IEICE TRANSACTIONS on Communications},
title={Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme},
year={2010},
volume={E93-B},
number={4},
pages={1013-1015},
abstract={Lee-Lee-Kim-Jeong proposed a hybrid authentication scheme to alleviate the latent security problems of mobile multi-hop networks. In this letter, we show that the Lee-Lee-Kim-Jeong scheme is insecure against the intercept attack.},
keywords={},
doi={10.1587/transcom.E93.B.1013},
ISSN={1745-1345},
month={April},}
Copy
TY - JOUR
TI - Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme
T2 - IEICE TRANSACTIONS on Communications
SP - 1013
EP - 1015
AU - Haeryong PARK
PY - 2010
DO - 10.1587/transcom.E93.B.1013
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E93-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 2010
AB - Lee-Lee-Kim-Jeong proposed a hybrid authentication scheme to alleviate the latent security problems of mobile multi-hop networks. In this letter, we show that the Lee-Lee-Kim-Jeong scheme is insecure against the intercept attack.
ER -