Secure Authentication Protocol for Mobile

被引:0
|
作者
Kalaichelvi, V. [1 ]
Chandrasekaran, R. M. [2 ]
机构
[1] SRC Sastra Univ, Kumbakonam, India
[2] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
关键词
Wireless network security; GSM; Authentication; protocol;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, the authentication protocols for cellular telephone networks have been designed for device authentication rather than user authentication, which bring certain limitations and restrictions on the functionality of the system. In this paper we propose a user authentication protocol for the Global System for Mobile communications (GSM) which permits the use of weak secrets (e.g., passwords or PINs) for authentication, providing new flexibilities for GSM users.
引用
收藏
页码:38 / +
页数:3
相关论文
共 50 条
  • [1] Secure Authentication Protocol for Mobile Payment
    Fan, Kai
    Li, Hui
    Jiang, Wei
    Xiao, Chengsheng
    Yang, Yintang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 610 - 620
  • [2] Secure Authentication Protocol for Mobile Payment
    Kai Fan
    Hui Li
    Wei Jiang
    Chengsheng Xiao
    Yintang Yang
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 610 - 620
  • [3] SPAM: Secure Protocol for Authentication in Mobile-Communications
    Das, ML
    Saxena, A
    [J]. ICMB 2005: International Conference on Mobile Business, 2005, : 23 - 27
  • [4] A Secure User Authentication Protocol for Heterogeneous Mobile Environments
    Hassan, Alzubair
    Hamza, Rafik
    Li, Fagen
    Ali, Awad
    Bashir, Mohammed Bakri
    Alqhtani, Samar M.
    Tawfeeg, Tawfeeg Mohmmed
    Yousif, Adil
    [J]. IEEE ACCESS, 2022, 10 : 69757 - 69770
  • [5] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [6] Secure authentication protocol in mobile IPv6 networks
    Koo, Jung Doo
    Koo, Jung Sook
    Lee, Dong Chun
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2006, 4253 : 548 - 555
  • [7] Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    [J]. 2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [8] Quantum secure two party authentication protocol for mobile devices
    Moony, Bshisht
    Barnwal, Amit K.
    Singh, Mrityunjay
    Mishra, Dheerendra
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2548 - 2559
  • [9] Quantum secure two party authentication protocol for mobile devices
    Bshisht Moony
    Amit K. Barnwal
    Mrityunjay Singh
    Dheerendra Mishra
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 2548 - 2559
  • [10] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)