A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks

被引:0
|
作者
Al-Fayoumi, Mustafa [1 ]
Nashwan, Shadi [1 ]
Yousef, Sufian [1 ]
Alzoubaidi, Abdel-Rahman [2 ]
机构
[1] Anglia Ruskin Univ, Chelmsford, Essex, England
[2] Univ AL Zaytoonah, Amman, Jordan
关键词
3rd Generation Mobile Networks; Authentication mechanism; End-to-End mobile security and Mobile Security Requirements;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of current authentication schemes for mobile systems have some weaknesses; such as leakage of UE identities and high update overhead of temporary identities. This paper proposes a secure authentication mechanism for mobile communication systems that satisfies the security requirements of the third generation mobile systems. In this proposed protocol, the number of messages between authentication entities of the network is reduced to four messages instead of five in initial authentication procedure. The subsequent authentication procedure only contains two message exchanges. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time and signaling traffic are minimized. Also, this proposed protocol is designed to be secure against network attacks, such as replay attacks and Guessing attacks and others attacks. Consequently, this approach is secure and practical as it can satisfy the security requirements of the third generation mobile communication systems based on hybrid asymmetric and symmetric cryptosystem, and can save up to 20% of the authentication traffic delay time.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Cryptanalysis of a hybrid authentication protocol for large mobile networks
    Tang, QA
    Mitchell, CJ
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (04) : 496 - 501
  • [2] A New Authentication Protocol for UMTS Mobile Networks
    Ja'afer Al-Saraireh
    Sufian Yousef
    EURASIP Journal on Wireless Communications and Networking, 2006
  • [3] A new authentication protocol for UMTS mobile networks
    Al-Saraireh, Ja'afer
    Yousef, Sufian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [4] A new efficient authentication protocol for mobile networks
    Hwang, Ren-Junn
    Su, Feng-Fu
    Comput Stand Interfaces, 2 (241-252):
  • [5] A new efficient authentication protocol for mobile networks
    Hwang, RJ
    Su, FF
    COMPUTER STANDARDS & INTERFACES, 2005, 28 (02) : 241 - 252
  • [6] An optimized authentication protocol for mobile networks
    Mahshid, Mir-Kamran
    Eslamipoor, Reza
    NEURAL COMPUTING & APPLICATIONS, 2014, 25 (02): : 379 - 385
  • [7] An optimized authentication protocol for mobile networks
    Mir-Kamran Mahshid
    Reza Eslamipoor
    Neural Computing and Applications, 2014, 25 : 379 - 385
  • [8] An efficient authentication protocol for mobile networks
    Shieh, SP
    Ho, FS
    Huang, YL
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 505 - 520
  • [9] Group Authentication Protocol for Mobile Networks
    Aboudagga, Nidal
    Quisquater, Jean-Jacques
    Eltoweissy, Mohamed
    THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,
  • [10] An Pre-authentication Protocol with Symmetric Keys for Secure Handover in Mobile WiMAX Networks
    Thuy Ngoc Nguyen
    Ma, Maode
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,