An improvement of mobile users authentication in the integration enviromnents

被引:5
|
作者
Hwang, MS
Lee, CC
Yang, WP
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung 413, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 300, Taiwan
关键词
authentication; certificate-based; mobile communication; security;
D O I
10.1078/1434-8411-54100113
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper shows that Tzeng and Tzeng's protocol has a drawback that the protocol can be easily crashed by an evil VLR attack. Therefore, we propose a slight modification to their protocol to improve their shortcoming. As a result, our protocol does not only enhance the security of Tzeng and Tzeng's protocol but also improves the efficiency.
引用
收藏
页码:293 / 297
页数:5
相关论文
共 50 条
  • [41] A new end-to-end authentication protocol for mobile users to access internet services
    He, LS
    Zhang, N
    He, LR
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 239 - 250
  • [42] A multi-expert based approach to continuous authentication of mobile-device users
    Mazhelis, O
    Seleznyov, A
    Puuronen, S
    [J]. CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 149 - 164
  • [43] An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique
    Jeong, Yoon-Su
    Kim, Yong-Tae
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 164 - +
  • [44] A User Authentication Schema Under the Integration of Mobile Edge Computing and Blockchain Technology
    Xue, Feng
    Li, Fangju
    [J]. International Journal of Ambient Computing and Intelligence, 2023, 14 (01)
  • [45] Improvement of mobile tour-guide robots from the perspective of users
    Ahn, Tae-Beom
    Kang, E-Sok
    [J]. Journal of Institute of Control, Robotics and Systems, 2012, 18 (10) : 955 - 963
  • [46] Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks
    Xie, Qi
    Tang, Zhixiong
    Chen, Kefei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 218 - 230
  • [47] An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
    Ganesh, S. Milton
    Manikandan, S. P.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [48] Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing
    Ehatisham-ul-Haq, Muhammad
    Azam, Muhammad Awais
    Naeem, Usman
    Amin, Yasar
    Loo, Jonathan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 109 : 24 - 35
  • [49] Improvement in the performance of mobile/hidden secondary users in multi-user CRN
    Khedkar, Rakhi A.
    Patil, Rajendrakumar A.
    [J]. IET COMMUNICATIONS, 2020, 14 (18) : 3143 - 3152
  • [50] Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems
    Far, Saeed Banaeian
    Alagheband, Mahdi R.
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 466 - 473