A new end-to-end authentication protocol for mobile users to access internet services

被引:0
|
作者
He, LS [1 ]
Zhang, N [1 ]
He, LR [1 ]
机构
[1] Univ Manchester, Dept Comp Sci, Mobile Architecture Syst Grp, Manchester M13 9PL, Lancs, England
关键词
authentication protocols; wireless communications;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When a mobile user using wireless devices tries to access to a Service Provider (SP) connected to wire-lined network such as the Internet, security risks experienced by SP as well as the wireless and wire-lined network providers are greater. The mobility and resource-limited nature exhibited by the wireless devices only make the security provision in such a context ever challenging. This paper attempts to set a step forward toward finding an asymmetrical approach to the provision of security to mobile users by re-examining the issue of end-to-end authentication. Having first examined the special security and performance requirements in this application context, the paper surveys the related work in the subject area, and then presents a new network-assisted end-to-end authentication and key exchange protocol suited to mobile users in their access to Internet services.
引用
收藏
页码:239 / 250
页数:12
相关论文
共 50 条
  • [21] Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC
    Markmann, Tobias
    Schmidt, Thomas C.
    Waehlisch, Matthias
    [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 603 - 604
  • [22] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments
    Hsu, Chien-Lung
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    Lin, Tzu-Wei
    Lu, Huang-Chia
    [J]. 2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138
  • [23] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    Aysu, Aydin
    Gulcan, Ege
    Moriyama, Daisuke
    Schaumont, Patrick
    Yung, Moti
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
  • [24] Cooperation and end-to-end in the Internet
    Kantola, Raimo
    Kabir, Hammad
    Loiseau, Patrick
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (12)
  • [25] End-to-end security implementation for mobile devices using TLS protocol
    Baris Kayayurt
    Tugkan Tuglular
    [J]. Journal in Computer Virology, 2006, 2 (1): : 87 - 97
  • [26] A secure end-to-end SMS-based mobile banking protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (15)
  • [27] pDCell: an End-to-End Transport Protocol for Mobile Edge Computing Architectures
    Fiandrino, Claudio
    de la Oliva, Antonio
    Widmer, Joerg
    Kogan, Kirill
    [J]. ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, : 71 - 80
  • [28] End-to-end security implementation for mobile devices using TLS protocol
    Kayayurt, Baris
    Tuglular, Tugkan
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 87 - 97
  • [29] EndSec: An End-to-End Message Security Protocol for Mobile Telecommunication Networks
    Kotapati, Kameswari
    Liu, Peng
    LaPorta, Thomas F.
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 776 - 782
  • [30] Open RAN Mobile Access: The View of an Operator on an End-To-End Implementation
    Cavazzoni, Carlo
    Caretti, Marco
    Percelsi, Alessandro
    Agus, Mauro
    [J]. 2023 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION, OFC, 2023,