A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Precision synchronization of computer network clocks
ACM SIGCOMM Computer Communication Review
Network and internetwork security: principles and practice
Network and internetwork security: principles and practice
Adaptive hybrid clock discipline algorithm for the network time protocol
IEEE/ACM Transactions on Networking (TON)
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
A note on Girault's self-certified model
Information Processing Letters
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
Private Authentication Techniques for the Global Mobility Network
Wireless Personal Communications: An International Journal
Clock synchronization for wireless local area networks
Euromicro-RTS'00 Proceedings of the 12th Euromicro conference on Real-time systems
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
A new delegation-based authentication protocol for use in portable communication systems
IEEE Transactions on Wireless Communications
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks
IEEE Transactions on Wireless Communications
An authentication technique based on distributed security management for the global mobility network
IEEE Journal on Selected Areas in Communications
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
A wide-adapted bantam protocol for roaming across wireless areas
Wireless Networks
Hi-index | 0.00 |
Recently, several authentication techniques have been developed for the global mobility network (GLOMONET), which provides mobile users with global roaming services. Due to the hardware limitations, the mobile user cannot support the heavy encryption and decryption. This investigation adjusts the entity in the roaming scenario that selects the session key to be used to different types of authentication schemes in GLOMONET and presents two provably secure and efficient authentication protocols for roaming services. One protocol is based on synchronized clocks, while the other uses random numbers. Compared to related approaches, the proposed authentication protocols not only reduce the number of transmissions, but also diminish the computational cost involved in encryption and decryption. Thus, they are more suitable for GLOMONET.