A hybrid authentication protocol for large mobile network

被引:18
|
作者
Chien, HY [1 ]
Jan, JK [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Appl Math, Taichung 40227, Taiwan
关键词
authentication; mobile networking; Kerberos;
D O I
10.1016/S0164-1212(02)00093-6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As the rapid development of wireless LAN and mobile network layer protocol Mobile-IP, a mobile user is allowed to access the service at the visited domain after he has been authenticated. The designing criteria of the inter-domain authentication protocols include: the scalability, the communication efficiency and the computational efficiency, and the robustness of security. In this article, we first show the weakness of some existing protocols against the session key compromise, and then propose a new and efficient interdomain authentication protocol. Based on public key, challenge-response and hash chaining, this new approach simultaneously achieves several practical merits: (1) good scalability, (2) low communication cost and low computational cost, and (3) resistance to the session key compromise attack. (C) 2002 Elsevier Inc. All rights reserved.
引用
收藏
页码:123 / 130
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of a hybrid authentication protocol for large mobile networks
    Tang, QA
    Mitchell, CJ
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (04) : 496 - 501
  • [2] Authentication Protocol in Mobile RFID Network
    Yang, Ming Hour
    Luo, Jia-Ning
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, : 108 - +
  • [3] A hybrid user authentication protocol for mobile IPTV service
    Soo-Cheol Kim
    Sang-Soo Yeo
    Sung Kwon Kim
    [J]. Multimedia Tools and Applications, 2013, 65 : 283 - 296
  • [4] A hybrid user authentication protocol for mobile IPTV service
    Kim, Soo-Cheol
    Yeo, Sang-Soo
    Kim, Sung Kwon
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (02) : 283 - 296
  • [5] Cryptanalysis of an optimized protocol for mobile network authentication and security
    Laih, CS
    Chiou, SY
    [J]. INFORMATION PROCESSING LETTERS, 2003, 85 (06) : 339 - 341
  • [6] Improvement on an optimized protocol for mobile network authentication and security
    Chang, CC
    Lee, JS
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 538 - 541
  • [7] Biometric Inspired Mobile Network Authentication and Protocol Validation
    Hong Liu
    Elia El Lazkani
    [J]. Mobile Networks and Applications, 2016, 21 : 130 - 138
  • [8] Biometric Inspired Mobile Network Authentication and Protocol Validation
    Liu, Hong
    El Lazkani, Elia
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 130 - 138
  • [9] An Efficient Lightweight Authentication Protocol for Mobile Ad Hoc Network
    EL Zouka, Heshem A.
    [J]. RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2010, 84 : 436 - 444
  • [10] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +