A new authentication protocol for portable communication systems

被引:0
|
作者
Xu, SB [1 ]
Jansen, C [1 ]
van Tilborg, H [1 ]
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, NL-5600 MB Eindhoven, Netherlands
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the global deployment of portable communication systems and the ongoing developments in this area, one expects more and more sophisticated security features to be provided such as entity authentication, robust user identity confidentiality and non-repudiation services. Motivated by these new security requirements, this article analyzes the security of authentication protocols in several mobile communication industry standards, such as DAMPS, GSM, and TETRA, and several proposals for future mobile communication systems. A new authentication protocol is presented to provide the above security services using symmetric cryptographic techniques only. The security and complexity of the new protocol are analyzed and compared with the aforementioned protocols.
引用
收藏
页码:216 / 230
页数:15
相关论文
共 50 条
  • [1] A New Authentication Protocol in Portable Communication Systems
    Qi, Ai-qin
    Shen, Yong-jun
    2015 4TH INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL PROTECTION (ICEEP 2015), 2015, : 2123 - 2127
  • [2] A new delegation-based authentication protocol for use in portable communication systems
    Lee, WB
    Yeh, CK
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2005, 4 (01) : 57 - 64
  • [3] A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2010, 6 (03) : 183 - 190
  • [4] An enhanced authentication protocol for personal communication systems
    Stach, JS
    Park, EK
    Su, Z
    1998 IEEE WORKSHOP ON APPLICATION-SPECIFIC SOFTWARE ENGINEERING AND TECHNOLOGY (ASSET 98) - PROCEEDINGS, 1998, : 128 - 132
  • [5] Analysis of a non repudiation authentication protocol for Personal Communication Systems
    Stach, JF
    Park, EK
    7TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS - PROCEEDINGS, 1998, : 289 - 293
  • [6] AN AUTHENTICATION PROTOCOL WITH BILLING NON-REPUDIATION TO PERSONAL COMMUNICATION SYSTEMS
    Chen, Tzung-Her
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2657 - 2664
  • [7] Robust three-factor authentication protocol for satellite communication systems
    Chen, Yulei
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [8] Cryptanalysis of park's authentication protocol in wireless mobile communication systems
    Dominguez, Alberto Peinado
    International Journal of Network Security, 2006, 3 (03) : 279 - 282
  • [9] A new mutual authentication and key distribution protocol for mobile communication environments
    Cho, D
    Jun, J
    Won, D
    PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : 333 - 336
  • [10] A New Authentication Protocol for RFID Communication in Multi-tag Arrangement
    Dhal, Subhasish
    Sen Gupta, Indranil
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 668 - 673