ACM Transactions on Computer Systems (TOCS)
Security protocol for IEEE 802.11 wireless local area network
Mobile Networks and Applications - Special issue on wireless LANs
Journal of Systems and Software
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
A hybrid authentication protocol for large mobile network
Journal of Systems and Software
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
Computer Communications
A PK-SIM card based end-to-end security framework for SMS
Computer Standards & Interfaces
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
An inter-domain authentication scheme for pervasive computing environment
Computers & Mathematics with Applications
Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms
Proceedings of the 3rd international conference on Security of information and networks
An authenticated key exchange to improve the security of Shi et al. and Kim et al.'s protocols
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
A security enhanced authentication and key distribution protocol for wireless networks
Security and Communication Networks
Hi-index | 0.00 |
This paper proposes a new efficient authentication protocol for mobile networks. The user, service provider and key distribution center authenticate mutually in the proposed protocol. In addition, the user and service provider will generate a secret session key for communication in this protocol. We prove the proposed protocol by using BAN logic. In our protocol, the key distribution center of the networks does not need to maintain the secret key database of users by using the key derivation function. The proposed protocol is based on symmetric cryptosystem, challenge-response and hash chaining. It only needs four message exchange rounds for intra-domain initial phase and seven message exchange rounds for inter-domain initial phase. Our initial phase only takes 17% and our subsequent phase requires 26% communication cost of Chien and Jan's protocol. The proposed protocol is more efficient than the others. It is suitable to apply in the mobile networks.