Two Authentication Protocols and their Security Analysis in Wireless Mobile Network

H. Li, Z. Fang, R. Li, W. Cao, and X. An (PRC)

Keywords

Wireless mobile network, Authentication protocol, Formal analysis, SVO logic

Abstract

According to the security characteristics of wireless mobile network, two kinds of simple authentication protocols: Point to Point Simple Authentication Protocol and Trusted Third Party Simple Authentication Protocol, were designed. And the author also has analysed the security of two protocols to make sure that both of them have achieved the target of key-oriented, key affirmation and mutual key trust via the formal analysis method, called SVO logic – the modal logic method based on knowledge and belief reasoning.

Important Links:



Go Back