End-to-end security protocol for mobile communications with end-user identification/authentication

被引:9
|
作者
Chang, CC
Chen, KL
Hwang, MS
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62107, Taiwan
关键词
authentication; cryptography; mobile communication; session key;
D O I
10.1023/B:WIRE.0000021422.21951.f0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As great progress has been made in mobile communications, many related researches on this topic have been proposed. In most of the proposed protocols so far, it has been assumed that the person using the mobile station is the registrar of the SIM card; as a matter of, the previous protocols for authentication and session key distribution are built upon this assumption. This way, the mobile user can only verify the identity of the owner of the SIM card. This means that the mobile user can only know that who registers the SIM card with which he communicates. Note that the human voice can be forged. To make sure that the speaker at the other end is the right owner of the SIM card, concept of the password is involved to construct the end-to-end security authentication protocol. In the proposed protocol, each mobile user can choose a password. When two mobile users want to communicate with each other, either user can request to perform a end-user identification process. Only when both of the end users input the correct passwords can the correct common session key be established.
引用
收藏
页码:95 / 106
页数:12
相关论文
共 50 条
  • [1] End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
    Chin-Chen Chang
    Kuo-Lun Chen
    Min-Shiang Hwang
    [J]. Wireless Personal Communications, 2004, 28 : 95 - 106
  • [2] Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication
    Zhou, YB
    Zhang, ZF
    Feng, DG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 372 - 374
  • [3] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
    Dojen, Reiner
    Pasca, Vladimir
    Coffey, Tom
    [J]. SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
  • [4] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808
  • [5] A Network Assisted End-to-End Security Protocol for Mobile Applications
    He, Lisha
    Zhang, Ning
    He, Lirong
    Rogers, Ian
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
  • [6] An end-to-end authentication protocol in wireless application protocol
    Yang, JP
    Shin, W
    Rhee, KH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
  • [7] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [8] End-to-end security implementation for mobile devices using TLS protocol
    Baris Kayayurt
    Tugkan Tuglular
    [J]. Journal in Computer Virology, 2006, 2 (1): : 87 - 97
  • [9] End-to-end security implementation for mobile devices using TLS protocol
    Kayayurt, Baris
    Tuglular, Tugkan
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97
  • [10] EndSec: An End-to-End Message Security Protocol for Mobile Telecommunication Networks
    Kotapati, Kameswari
    Liu, Peng
    LaPorta, Thomas F.
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 776 - 782