ACM Transactions on Computer Systems (TOCS)
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Ticket based service access for the mobile user
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Journal of Computer Security
Password authentication with insecure communication
Communications of the ACM
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Ticket-based service access scheme for mobile users
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Authentication and Payment in Future Mobile Systems
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Fast Digital Identity Revocation (Extended Abstract)
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Infinite Length Hash Chains and Their Applications
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
NetCard - A Practical Electronic-Cash System
Proceedings of the International Workshop on Security Protocols
Electronic Payments of Small Amounts
Proceedings of the International Workshop on Security Protocols
Secure Billing for Mobile Information Services in UMTS
IS&N '98 Proceedings of the 5th International Conference on Intelligence and Services in Networks: Technology for Ubiquitous Telecom Services
Accountable Anonymous Access to Services in Mobile Communication Systems
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Ticket Based Authentication and Payment Protocol for Mobile Telecommunications Systems
PRDC '01 Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing
Ticket-Based Secure Delegation Service Supporting Multiple Domain Models
PRDC '01 Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing
On the security of wireless network access with enhancements
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A Secure Wireless LAN System Retaining Privacy
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
TARP: Ticket-based Address Resolution Protocol
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Achieving secure and flexible M-services through tickets
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Hi-index | 0.24 |
Third-generation mobile systems (3G) such as Universal Mobile Telecommunications Service (UMTS) bring mobile users a broad range of new value-added services (VASs). For mobile access across multiple service domains, the traditional access mechanisms require the exchange of authentication information between the home domain and the foreign domain using roaming agreements. This requirement involves complicated and expensive authentication activities in large scale mobile networks. This paper proposes a lightweight service access mechanism in which the computation complexity is low on the mobile device and the ticket can be reused. It introduces two hash chains: an authentication chain and a payment chain. The authentication chain allows a ticket to be reused and achieves mutual authentication and non-repudiation. The payment chain is lightweight, practical and likely to avoid re-initialization. Security analysis and comparison with related works indicate that our proposal is more appropriate for mobile communication networks.