Cryptanalysis of a hybrid authentication protocol for large mobile networks

被引:6
|
作者
Tang, QA [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
mobile security; authentication; public key cryptography; key distribution;
D O I
10.1016/j.jss.2005.04.022
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, namely the intra-domain authentication protocol and the inter-domain authentication protocol, which are used depending on whether the user and the request service are located in the same domain. We show that both sub-protocols suffer from a number of security vulnerabilities. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:496 / 501
页数:6
相关论文
共 50 条
  • [1] A hybrid authentication protocol for large mobile network
    Chien, HY
    Jan, JK
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 67 (02) : 123 - 130
  • [2] Cryptanalysis of an optimized protocol for mobile network authentication and security
    Laih, CS
    Chiou, SY
    [J]. INFORMATION PROCESSING LETTERS, 2003, 85 (06) : 339 - 341
  • [3] Cryptanalysis of an authentication protocol
    Groza, B
    Petrica, D
    [J]. Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Proceedings, 2005, : 147 - 153
  • [4] Cryptanalysis and improvement of an authentication protocol for wireless sensor networks
    Neerul
    Kumar, Devender
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (05):
  • [5] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243
  • [6] Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks
    Das, Ashok Kumar
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 1 - 9
  • [7] An efficient authentication protocol for mobile networks
    Shieh, SP
    Ho, FS
    Huang, YL
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 505 - 520
  • [8] An optimized authentication protocol for mobile networks
    Mahshid, Mir-Kamran
    Eslamipoor, Reza
    [J]. NEURAL COMPUTING & APPLICATIONS, 2014, 25 (02): : 379 - 385
  • [9] An optimized authentication protocol for mobile networks
    Mir-Kamran Mahshid
    Reza Eslamipoor
    [J]. Neural Computing and Applications, 2014, 25 : 379 - 385
  • [10] Group Authentication Protocol for Mobile Networks
    Aboudagga, Nidal
    Quisquater, Jean-Jacques
    Eltoweissy, Mohamed
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,