IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups

被引:1
|
作者
Aboudagga, Nidal [1 ]
de Meulenaer, Giacomo [1 ]
Eltoweissy, Mohamed [2 ]
Quisquater, Jean-Jacques [1 ]
机构
[1] UCL Crypto Grp, Pl Levant 3, B-1348 Louvaine La Neuve, Belgium
[2] Adv Res Inst, Arlington, VA 22203 USA
关键词
D O I
10.1109/LCN.2009.5355156
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advancement and the wide-spread use of the Internet and wireless communications in our professional endeavors and personal lives are making ubiquitous authenticated connectivity for mobile users indispensable. Individuals and groups may roam within a network or across networks, either in infrastructure or ad hoc mode. In any case, uninterrupted authenticated communication would be required for numerous applications, in particular real-time multimedia applications. In this paper, we propose an imbricated protocol suite for authentication in different mobility contexts at both the intra- and inter-network levels. To the best of our knowledge, this is the first comprehensive treatment of authentication in mobile networks. We demonstrate that our solution supports seamless secure mobility while incurring low overhead in the authentication process.
引用
收藏
页码:30 / +
页数:3
相关论文
共 50 条
  • [1] A robust protocol for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. 2002 IEEE PROCEEDINGS OF THE NINETEENTH NATIONAL RADIO SCIENCE CONFERENCE, VOLS 1 AND 2, 2002, : 255 - 261
  • [2] AUTHENTICATION OF MOBILE USERS
    MOLVA, R
    SAMFAT, D
    TSUDIK, G
    [J]. IEEE NETWORK, 1994, 8 (02): : 26 - 34
  • [3] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808
  • [4] Efficient authentication protocol with anonymity and key protection for mobile Internet users
    Jiang, Yan
    Zhu, Youwen
    Wang, Jian
    Xiang, Yong
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 : 179 - 191
  • [5] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [6] A new end-to-end authentication protocol for mobile users to access internet services
    He, LS
    Zhang, N
    He, LR
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 239 - 250
  • [7] An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique
    Jeong, Yoon-Su
    Kim, Yong-Tae
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 164 - +
  • [8] An effective approach for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. IEEE 55TH VEHICULAR TECHNOLOGY CONFERENCE, VTC SPRING 2002, VOLS 1-4, PROCEEDINGS, 2002, : 598 - 601
  • [9] Authentication of Mobile Users in Third Generation Mobile Systems
    Zhi-Jia Tzeng
    Wen-Guey Tzeng
    [J]. Wireless Personal Communications, 2001, 16 : 35 - 50
  • [10] Authentication of mobile users in third generation mobile systems
    Tzeng, ZJ
    Tzeng, WG
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2001, 16 (01) : 35 - 50