A new end-to-end authentication protocol for mobile users to access internet services

被引:0
|
作者
He, LS [1 ]
Zhang, N [1 ]
He, LR [1 ]
机构
[1] Univ Manchester, Dept Comp Sci, Mobile Architecture Syst Grp, Manchester M13 9PL, Lancs, England
关键词
authentication protocols; wireless communications;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When a mobile user using wireless devices tries to access to a Service Provider (SP) connected to wire-lined network such as the Internet, security risks experienced by SP as well as the wireless and wire-lined network providers are greater. The mobility and resource-limited nature exhibited by the wireless devices only make the security provision in such a context ever challenging. This paper attempts to set a step forward toward finding an asymmetrical approach to the provision of security to mobile users by re-examining the issue of end-to-end authentication. Having first examined the special security and performance requirements in this application context, the paper surveys the related work in the subject area, and then presents a new network-assisted end-to-end authentication and key exchange protocol suited to mobile users in their access to Internet services.
引用
收藏
页码:239 / 250
页数:12
相关论文
共 50 条
  • [1] A new privacy and authentication protocol for end-to-end mobile users
    Lee, CC
    Yang, CC
    Hwang, MS
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2003, 16 (09) : 799 - 808
  • [2] End-to-end security protocol for mobile communications with end-user identification/authentication
    Chang, CC
    Chen, KL
    Hwang, MS
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2004, 28 (02) : 95 - 106
  • [3] End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
    Chin-Chen Chang
    Kuo-Lun Chen
    Min-Shiang Hwang
    [J]. Wireless Personal Communications, 2004, 28 : 95 - 106
  • [4] An end-to-end authentication protocol in wireless application protocol
    Yang, JP
    Shin, W
    Rhee, KH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
  • [5] Secure End-To-End Authentication for Mobile Banking
    Singh, Basudeo
    Jasmine, K. S.
    [J]. SOFTWARE ENGINEERING IN INTELLIGENT SYSTEMS (CSOC2015), VOL 3, 2015, 349 : 223 - 232
  • [6] Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication
    Zhou, YB
    Zhang, ZF
    Feng, DG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 372 - 374
  • [7] BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users
    Saxena, Neetesh
    Shen, Hong
    Komninos, Nikos
    Choo, Kim-Kwang Raymond
    Chaudhari, Narendra S.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 550 - 565
  • [8] Mobile Internet in Stereo: An End-to-End Scenario
    Warma, Henna
    Leva, Tapio
    Eggert, Lars
    Hammainen, Heikki
    Manner, Jukka
    [J]. INCENTIVES, OVERLAYS, AND ECONOMIC TRAFFIC CONTROL, 2010, 6236 : 64 - +
  • [9] Efficient end-to-end authentication protocols for mobile networks
    Chang, CH
    Tu, K
    Chen, KC
    [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
  • [10] An End-to-End Caching Protocol for Web Services
    Liyanaarachchi, Amila
    Weerawarana, Shahani
    [J]. INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER2012), 2012, : 96 - 102