Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
The GSM System for Mobile Communications
The GSM System for Mobile Communications
Insider Fraud (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
Protocols for Authentication and Key Establishment
Protocols for Authentication and Key Establishment
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Efficient anonymous roaming and its security analysis
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
A secure roaming protocol involves three parties: a roaming user, a visiting foreign server and the user’s home server. The protocol allows the user and the foreign server to establish a session key and carry out mutual authentication with the help of the home server. In the mutual authentication, user authentication is generally done in two steps. First, the user claims that a particular server is his home server. Second, that particular server is called in by the foreign server for providing a ‘credential’ which testifies the user’s claim. We present a new attacking technique which allows a malicious server to modify the user’s claim in the first step without being detected and provide a fake credential to the foreign server in the second step in such a way that the foreign server believes that the malicious server is the user’s home server. We give some examples to explain why it is undesirable in practice if a roaming protocol is vulnerable to this attack. We also show that there are three roaming protocols proposed previously which are vulnerable to this attack.