An improvement of mobile users authentication in the integration environments

被引:0
|
作者
Hwang, Min-Shiang [1 ]
Lee, Cheng-Chi [2 ]
Yang, Wei-Pang [2 ]
机构
[1] Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd, Wufeng, Taichung County 413, Taiwan
[2] Department of Computer and Information Science, National Chiao-Tung University, 1001 Ta Hsueh Road, Hsinchu 300, Taiwan
关键词
Algorithms - Computational methods - Cryptography - Data privacy - Network protocols - Security of data - Signal processing;
D O I
暂无
中图分类号
学科分类号
摘要
This paper shows that Tzeng and Tzeng's protocol has a drawback that the protocol can be easily crashed by an evil VLR attack. Therefore, we propose a slight modification to their protocol to improve their shortcoming. As a result, our protocol does not only enhance the security of Tzeng and Tzeng's protocol but also improves the efficiency. © Urban & Fischer Verlag.
引用
收藏
相关论文
共 50 条
  • [1] An improvement of mobile users authentication in the integration environments
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Yang, Wei-Pang
    [J]. AEU-Archiv fur Elektronik und Ubertragungstechnik, 2002, 56 (05): : 293 - 297
  • [2] An improvement of mobile users authentication in the integration enviromnents
    Hwang, MS
    Lee, CC
    Yang, WP
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2002, 56 (05) : 293 - 297
  • [3] AUTHENTICATION OF MOBILE USERS
    MOLVA, R
    SAMFAT, D
    TSUDIK, G
    [J]. IEEE NETWORK, 1994, 8 (02): : 26 - 34
  • [4] An effective approach for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. IEEE 55TH VEHICULAR TECHNOLOGY CONFERENCE, VTC SPRING 2002, VOLS 1-4, PROCEEDINGS, 2002, : 598 - 601
  • [5] A robust protocol for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. 2002 IEEE PROCEEDINGS OF THE NINETEENTH NATIONAL RADIO SCIENCE CONFERENCE, VOLS 1 AND 2, 2002, : 255 - 261
  • [6] Authentication of Mobile Users in Third Generation Mobile Systems
    Zhi-Jia Tzeng
    Wen-Guey Tzeng
    [J]. Wireless Personal Communications, 2001, 16 : 35 - 50
  • [7] Authentication of mobile users in third generation mobile systems
    Tzeng, ZJ
    Tzeng, WG
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2001, 16 (01) : 35 - 50
  • [8] Authentication of mobile users in personal communication system
    Liu, JW
    Wang, YM
    [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1239 - 1242
  • [9] Authentication of users of mobile devices by their motor reactions
    Nechiporenko, A.S.
    Gubarenko, E.V.
    Gubarenko, M.S.
    [J]. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [10] Efficient Authentication and Authorization Infrastructure for Mobile Users
    Jin, Zhen Ai
    Lee, Sang-Eon
    Yoo, Kee Young
    [J]. ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, 2008, 4977 : 155 - +