Abstract

Replay attack is a typical breach of secured communication between peers that threatens the very design of authentication and key distribution protocols. The designed and proposed protocols are analysed for its strength and weakness and possible vulnerability of replay attack is analysed. Replay attack is type of man-in-middle attack. In this paper, we analyse the replay attack and its countermeasure and propose a new authentication protocol as a solution of replay attack in Junhong Li, 2009 protocol. The session key generated is confirmed by the attacker as a model of secured communication. The sender and receiver without having any idea of such sniffing confidentially enter into the mode of secure communication. All the communication over the session can be hijacked without a trace unless the third party nonce generator is challenged for subsequent renewal and start of new session with the same session key is consciously avoided.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call