Cryptanalysis of a hybrid authentication protocol for large mobile networks

被引:6
|
作者
Tang, QA [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
mobile security; authentication; public key cryptography; key distribution;
D O I
10.1016/j.jss.2005.04.022
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, namely the intra-domain authentication protocol and the inter-domain authentication protocol, which are used depending on whether the user and the request service are located in the same domain. We show that both sub-protocols suffer from a number of security vulnerabilities. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:496 / 501
页数:6
相关论文
共 50 条
  • [41] Adaptive protocol for entity authentication and key agreement in mobile networks
    Zhang, MX
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 166 - 183
  • [42] A Simple Authentication and Key Distribution Protocol in Wireless Mobile Networks
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2282 - +
  • [43] Secure authentication protocol in mobile IPv6 networks
    Koo, Jung Doo
    Koo, Jung Sook
    Lee, Dong Chun
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2006, 4253 : 548 - 555
  • [44] An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks
    Hu Yan-zhi
    Ma Da-wei
    Li Xiao-fei
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 111 - 115
  • [45] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [46] A Hybrid Localization Protocol for Mobile Sensor Networks
    Mikki, Mohammad A.
    [J]. ARAB GULF JOURNAL OF SCIENTIFIC RESEARCH, 2009, 27 (1-2): : 48 - 58
  • [47] Cryptanalysis on dynamic authentication protocol for personal communication system
    Chien, HY
    Chen, YH
    Jan, JK
    Tseng, YM
    [J]. ELECTRONICS LETTERS, 2001, 37 (14) : 895 - 896
  • [48] Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol
    Li, Jing
    Zhou, Zhiping
    Wang, Ping
    [J]. 2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 7292 - 7297
  • [49] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    [J]. Wireless Personal Communications, 2024, 138 (04) : 2613 - 2635
  • [50] Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks
    Khalid, Madiha
    Mujahid, Umar
    Najam-ul-Islam, Muhammad
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (08):