Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
On the security of wireless network access with enhancements
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Mutual Authentication and Key Agreement for GSM
ICMB '06 Proceedings of the International Conference on Mobile Business
A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks
WIMOB '07 Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
Efficient authentication protocols of GSM
Computer Communications
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
An Efficient Mobile Authentication Scheme for Wireless Networks
IEEE Transactions on Wireless Communications
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
Hi-index | 0.00 |
Many security mechanisms for mobile communications have been introduced in the literature. Among these mechanisms, authentication plays a quite important role in the entire mobile network system and acts as the first defense against attackers since it ensures the correctness of the identities of distributed communication entities before they engage in any other communication activity. Therefore, in order to guarantee the quality of this advanced service, an efficient (especially user-efficient) and secure authentication scheme is urgently desired. In this paper, we come up with a novel authentication mechanism, called the nested one-time secret mechanism, tailored for mobile communication environments. Through maintaining inner and outer synchronously changeable common secrets, respectively, every mobile user can be rapidly authenticated by visited location register (VLR) and home location register (HLR), respectively, in the proposed scheme. Not only does the proposed solution achieve mutual authentication, but it also greatly reduces the computation and communication cost of the mobile users as compared to the existing authentication schemes. Finally, the security of the proposed scheme will be demonstrated by formal proofs.