A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks

被引:0
|
作者
Al-Fayoumi, Mustafa [1 ]
Nashwan, Shadi [1 ]
Yousef, Sufian [1 ]
Alzoubaidi, Abdel-Rahman [2 ]
机构
[1] Anglia Ruskin Univ, Chelmsford, Essex, England
[2] Univ AL Zaytoonah, Amman, Jordan
关键词
3rd Generation Mobile Networks; Authentication mechanism; End-to-End mobile security and Mobile Security Requirements;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of current authentication schemes for mobile systems have some weaknesses; such as leakage of UE identities and high update overhead of temporary identities. This paper proposes a secure authentication mechanism for mobile communication systems that satisfies the security requirements of the third generation mobile systems. In this proposed protocol, the number of messages between authentication entities of the network is reduced to four messages instead of five in initial authentication procedure. The subsequent authentication procedure only contains two message exchanges. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time and signaling traffic are minimized. Also, this proposed protocol is designed to be secure against network attacks, such as replay attacks and Guessing attacks and others attacks. Consequently, this approach is secure and practical as it can satisfy the security requirements of the third generation mobile communication systems based on hybrid asymmetric and symmetric cryptosystem, and can save up to 20% of the authentication traffic delay time.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Mutual Authentication Protocol for LTE Based Mobile Networks
    Naqash, Talha
    Hasan, M. Amish
    Ishfaq, Abubakar
    Shabir, Kashif
    Yasin, Adil
    Mujhaid, Umar
    Najam-ul-Islam, M.
    Mehmood, Hasan
    2012 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS AND TECHNOLOGIES (ICOSST), 2012, : 84 - 87
  • [22] A lightweight authentication protocol for mobile ad hoc networks
    Lu, B
    Pooch, UW
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 546 - 551
  • [23] A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks
    Fanian, Ali
    Berenjkoub, Mehdi
    Gulliver, T. Aaron
    2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), 2010,
  • [24] New Security Level of Authentication and Key Agreement Protocol for the IoT on LTE Mobile Networks
    Ouaissa, Mariya
    Rhattoy, Abdallah
    Chana, Idriss
    2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 199 - 204
  • [25] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [26] Adaptive protocol for entity authentication and key agreement in mobile networks
    Zhang, MX
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 166 - 183
  • [27] A Simple Authentication and Key Distribution Protocol in Wireless Mobile Networks
    Wang, Jian
    Jiang, Nan
    Li, Hui
    Niu, Xinxin
    Yang, Yixian
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2282 - +
  • [28] Secure authentication protocol in mobile IPv6 networks
    Koo, Jung Doo
    Koo, Jung Sook
    Lee, Dong Chun
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2006, 4253 : 548 - 555
  • [29] An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks
    Hu Yan-zhi
    Ma Da-wei
    Li Xiao-fei
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 111 - 115
  • [30] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)