Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Communications of the ACM
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
The Group Diffie-Hellman Problems
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Universal Padding Schemes for RSA
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Some findings on the network performance of broadband hosts
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
RSA-OAEP Is Secure under the RSA Assumption
Journal of Cryptology
Towards Certificate-Based Authentication for Future Mobile Communications
Wireless Personal Communications: An International Journal
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Secure authentication system for public WLAN roaming
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Characterizing residential broadband networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Mobile PKI: a PKI-based authentication framework for the next generation mobile communications
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Stronger security of authenticated key exchange
ProvSec'07 Proceedings of the 1st international conference on Provable security
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Examining indistinguishability-based proof models for key establishment protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
New proofs for NMAC and HMAC: security without collision-resistance
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Strongly unforgeable signatures based on computational diffie-hellman
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Interoperability between UMTS and cdma2000 networks
IEEE Wireless Communications
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
Access security in CDMA2000, including a comparison with UMTS access security
IEEE Wireless Communications
An adaptive three-party accounting protocol
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
Enhanced wireless roaming security using three-party authentication and tunnels
Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities
Computer Networks: The International Journal of Computer and Telecommunications Networking
Exploiting proxy-based federated identity management in wireless roaming access
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Hi-index | 0.00 |
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals try to keep the service provider role behind the home network and let the foreign network create a tunnel connection through which all service requests of the mobile device are sent to and answered directly by the home network. Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security challenges on authentication and key establishment, as the goal is not only to protect the end-to-end communication between the tunnel peers but also the tunnel itself. In this paper we formally specify mutual authentication and key establishment goals for WRT and propose an efficient and provably secure protocol that can be used to secure such roaming session. Additionally, we describe some modular protocol extensions to address resistance against DoS attacks, anonymity of the mobile device and unlinkability of its roaming sessions, as well as the accounting claims of the foreign network in commercial scenarios.