In the above paper, Tu et al. proposed an efficient and anonymous authenticated key exchange scheme optimized for wearable computing environments, utilizing lightweight cryptographic primitives like XOR, ASCON, and hash functions. They claimed the employed Authenticated Key Exchange (AKE) scheme is robust against prevalent security threats. However, our analysis reveal a critical vulnerability to replay attacks that could undermine the protocol's security; specifically, an attacker could intercept messages and induce unauthorized server-side password updates, effectively blocking further legitimate user communications. Upon dissecting the root causes of this vulnerability, we offer targeted recommendations to mitigate such attacks and reinforce the protocol's defenses.
机构:
Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R ChinaBeijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
Tu, Shanshan
Badshah, Akhtar
论文数: 0引用数: 0
h-index: 0
机构:
Univ Malakand, Dept Software Engn, Dir Lower 18800, PakistanBeijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
机构:
Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R ChinaBeijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
Tu, Shanshan
Badshah, Akhtar
论文数: 0引用数: 0
h-index: 0
机构:
Univ Malakand, Dept Software Engn, Dir Lower 18800, PakistanBeijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China