A hybrid authentication protocol for large mobile network

被引:18
|
作者
Chien, HY [1 ]
Jan, JK [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Appl Math, Taichung 40227, Taiwan
关键词
authentication; mobile networking; Kerberos;
D O I
10.1016/S0164-1212(02)00093-6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As the rapid development of wireless LAN and mobile network layer protocol Mobile-IP, a mobile user is allowed to access the service at the visited domain after he has been authenticated. The designing criteria of the inter-domain authentication protocols include: the scalability, the communication efficiency and the computational efficiency, and the robustness of security. In this article, we first show the weakness of some existing protocols against the session key compromise, and then propose a new and efficient interdomain authentication protocol. Based on public key, challenge-response and hash chaining, this new approach simultaneously achieves several practical merits: (1) good scalability, (2) low communication cost and low computational cost, and (3) resistance to the session key compromise attack. (C) 2002 Elsevier Inc. All rights reserved.
引用
收藏
页码:123 / 130
页数:8
相关论文
共 50 条
  • [31] A new authentication protocol for UMTS mobile networks
    Al-Saraireh, Ja'afer
    Yousef, Sufian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [32] A New Authentication Protocol for UMTS Mobile Networks
    Ja'afer Al-Saraireh
    Sufian Yousef
    [J]. EURASIP Journal on Wireless Communications and Networking, 2006
  • [33] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [34] Mutual authentication protocol for mobile RFID systems
    Zhou, Jingxian
    Zhou, Yajian
    Xiao, Feng
    Niu, Xinxin
    [J]. Journal of Computational Information Systems, 2012, 8 (08): : 3261 - 3268
  • [35] A simple and rapid authentication protocol in mobile networks
    Guo, Ming-Huang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2596 - 2601
  • [36] A scalable and practical authentication protocol in mobile IP
    Lee, Yong
    Lee, Goo-Yeon
    Kim, Hwa-Jong
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (02) : 601 - 604
  • [37] AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
    Rahmani, Amir Masoud
    Mohammadi, Mokhtar
    Lansky, Jan
    Mildeova, Stanislava
    Safkhani, Masoumeh
    Kumari, Saru
    Karim, Sarkhel H. Taher
    Hosseinzadeh, Mehdi
    [J]. IEEE ACCESS, 2021, 9 : 88256 - 88271
  • [38] An adaptive and transient authentication protocol for mobile device
    Chen, Tzung-Her
    Hung, Tsung-Hao
    [J]. WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2007, : 147 - 151
  • [39] A new efficient authentication protocol for mobile networks
    Hwang, Ren-Junn
    Su, Feng-Fu
    [J]. Comput Stand Interfaces, 2 (241-252):
  • [40] MAPMP: A mutual authentication protocol for mobile payment
    Wang, Eric Ke
    Cao, Zhenjie
    Wu, Tsu-Yang
    Chen, Chien-Ming
    [J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6 (04): : 697 - 707