Download Now Free registration required
Nowadays, most of sensitive applications over insecure network are protected by some authenticated secure channel which is highly relies on specific Authenticated Key Exchange (AKE) protocol. Nevertheless, the leakage of authentication credential used in AKE protocol somehow result in unauthorized exploitation of credential information via IDentity Impersonation (IDI) attack. To address the problem of IDI through the use of stolen or compromised authentication secrets, in this paper, the authors propose a framework of execution state synchronization for authenticated key exchange protocol to either prevent IDI attack by detecting attempts thereof, or limit its consequences by detecting situations of previously unidentified IDI.
- Format: PDF
- Size: 400 KB