An optimized authentication protocol for mobile networks

被引:2
|
作者
Mahshid, Mir-Kamran [1 ]
Eslamipoor, Reza [2 ]
机构
[1] Univ Zanjan, Dept Informat & Commun Engn, Zanjan, Iran
[2] Yazd Univ, Dept Ind Engn, Yazd, Iran
来源
NEURAL COMPUTING & APPLICATIONS | 2014年 / 25卷 / 02期
关键词
Authentication; Mobile network; Inter-domain authentication; Kerberos;
D O I
10.1007/s00521-013-1496-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Practical secure communication of mobile systems with low communication cost has become one of the major research directions. An established public key infrastructure (PKI) provides key management and key distribution mechanisms, which can lead to authentication and secure communication. Adding public key cryptography to Kerberos provides a nice congruence to public key protocols, which can obviate the human users' burden to manage strong passwords. This paper emphasizes on authentication as a considerable issue related to security. Additionally, an efficient and secure hybrid authentication protocol for large mobile network is proposed. Its infrastructure accommodates explosive growth of the large mobile network. It reduces the communication cost for providing secure network access in inter-domain communication. This method is based on symmetric cryptosystem, PKI, challenge-response and hash chaining.
引用
收藏
页码:379 / 385
页数:7
相关论文
共 50 条
  • [1] An optimized authentication protocol for mobile networks
    Mir-Kamran Mahshid
    Reza Eslamipoor
    [J]. Neural Computing and Applications, 2014, 25 : 379 - 385
  • [2] An efficient authentication protocol for mobile networks
    Shieh, SP
    Ho, FS
    Huang, YL
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 505 - 520
  • [3] Group Authentication Protocol for Mobile Networks
    Aboudagga, Nidal
    Quisquater, Jean-Jacques
    Eltoweissy, Mohamed
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007, 2007,
  • [4] Improvement on an optimized protocol for mobile network authentication and security
    Chang, CC
    Lee, JS
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 538 - 541
  • [5] Cryptanalysis of an optimized protocol for mobile network authentication and security
    Laih, CS
    Chiou, SY
    [J]. INFORMATION PROCESSING LETTERS, 2003, 85 (06) : 339 - 341
  • [6] A new authentication protocol for UMTS mobile networks
    Al-Saraireh, Ja'afer
    Yousef, Sufian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [7] A New Authentication Protocol for UMTS Mobile Networks
    Ja'afer Al-Saraireh
    Sufian Yousef
    [J]. EURASIP Journal on Wireless Communications and Networking, 2006
  • [8] A simple and rapid authentication protocol in mobile networks
    Guo, Ming-Huang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2596 - 2601
  • [9] A new efficient authentication protocol for mobile networks
    Hwang, RJ
    Su, FF
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 28 (02) : 241 - 252
  • [10] A new efficient authentication protocol for mobile networks
    Hwang, Ren-Junn
    Su, Feng-Fu
    [J]. Comput Stand Interfaces, 2 (241-252):