Impersonation Attack. Impersonation attack means that illegal users impersonate legal ones and pass the authentication process with the stolen authenticated message to enter the system. In the proposed group authenticated key agreement mechanism, the attacker can not obtain the authenticated message of KGSi because KGSi is encrypted. Without KGSi , the attacker can not impersonate Ui or GWN. Therefore, PL-GAKA can defend impersonation attacks.
Appears in 2 contracts
Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme