A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Using encryption for authentication in large networks of computers
Communications of the ACM
SIAM Journal on Computing
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
Extended Proxy Signatures for Smart Cards
ISW '99 Proceedings of the Second International Workshop on Information Security
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Security model and framework for information aggregation in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Solutions to the GSM Security Weaknesses
NGMAST '08 Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
Enhanced delegation-based authentication protocol for PCSs
IEEE Transactions on Wireless Communications
Improved delegation-based authentication protocol for secure roaming service with unlinkability
IEEE Communications Letters
IEEE/ACM Transactions on Networking (TON)
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
A new delegation-based authentication protocol for use in portable communication systems
IEEE Transactions on Wireless Communications
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks
IEEE Transactions on Wireless Communications
Mobile Privacy in Wireless Networks-Revisited
IEEE Transactions on Wireless Communications
An Efficient Mobile Authentication Scheme for Wireless Networks
IEEE Transactions on Wireless Communications
Authentication of mobile users
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, an approach of mutual authentication and key exchange for mobile access, based on the trust delegation and message authentication code, is developed, and a novel nonce-based authentication approach is presented. The proposed protocols can effectively defend all known attacks to mobile networks including the denial-of-service attacks and man-in-the-middle attacks. In particular, in contrast to some previous work, our design gives users a chance to set a session key according to users' will, and does not require a mobile user to compute useless hash key chains in the face of HLR-online authentication failures or run the initial authentication protocol before HLR-offline authentication. Moreover, our design enjoys both computation efficiency and communication efficiency as compared to known mobile authentication schemes.