A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks

被引:0
|
作者
Al-Fayoumi, Mustafa [1 ]
Nashwan, Shadi [1 ]
Yousef, Sufian [1 ]
Alzoubaidi, Abdel-Rahman [2 ]
机构
[1] Anglia Ruskin Univ, Chelmsford, Essex, England
[2] Univ AL Zaytoonah, Amman, Jordan
关键词
3rd Generation Mobile Networks; Authentication mechanism; End-to-End mobile security and Mobile Security Requirements;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of current authentication schemes for mobile systems have some weaknesses; such as leakage of UE identities and high update overhead of temporary identities. This paper proposes a secure authentication mechanism for mobile communication systems that satisfies the security requirements of the third generation mobile systems. In this proposed protocol, the number of messages between authentication entities of the network is reduced to four messages instead of five in initial authentication procedure. The subsequent authentication procedure only contains two message exchanges. Therefore, the bottleneck at authentication center is avoided by reducing the number of messages between mobile and authentication center. The authentication time delay, call setup time and signaling traffic are minimized. Also, this proposed protocol is designed to be secure against network attacks, such as replay attacks and Guessing attacks and others attacks. Consequently, this approach is secure and practical as it can satisfy the security requirements of the third generation mobile communication systems based on hybrid asymmetric and symmetric cryptosystem, and can save up to 20% of the authentication traffic delay time.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Fast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 361 - 375
  • [42] A Secure Authentication Protocol among Mobile Phone and Wireless Sensor Networks
    Bruce, Ndibanje
    Lee, Hoon Jae
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 52 - 59
  • [43] An electronic voting protocol with deniable authentication for mobile ad hoc networks
    Li, Chun-Ta
    Hwang, Min-Shiang
    Liu, Chi-Yu
    COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2534 - 2540
  • [44] An Identity Based Secure and Fast Authentication Protocol in Wireless Mobile Networks
    Wang, Hongchao
    Dong, Ping
    Zhang, Hongke
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4740 - 4743
  • [45] A new authentication protocol for roaming users in GMS networks
    Al-Tawil, K
    Akrami, A
    IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1999, : 93 - 99
  • [46] A new Authentication and Key Exchange Protocol for Insecure Networks
    Fereidooni, H.
    Taheri, H.
    Mahramian, M.
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4541 - +
  • [47] A new user authentication protocol for mobile terminals in wireless network
    Information Technology R and D Center, Mitsubishi Electric Corporation, Japan
    不详
    Proc. IEEE Int. Conf. Mobile Data Manage., (94-98):
  • [48] A new authentication protocol based on pointer forwarding for mobile communications
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Liao, I-En
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (05): : 661 - 672
  • [49] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +
  • [50] A New Mutual Authentication Protocol in Mobile RFID for Smart Campus
    Zheng, Lijuan
    Song, Chunlei
    Cao, Ning
    Li, Zhaoxuan
    Zhou, Wenfeng
    Chen, Jianyou
    Meng, Lili
    IEEE ACCESS, 2018, 6 : 60996 - 61005