Private Authentication Techniques for the Global Mobility Network
Wireless Personal Communications: An International Journal
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
Computer Communications
Packet construction for secure conference call request in ad hoc network systems
Information Sciences: an International Journal
A self-encryption authentication protocol for teleconference services
International Journal of Security and Networks
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
IEEE Communications Letters
IEEE Transactions on Wireless Communications
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
Wireless Personal Communications: An International Journal
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
IEEE Transactions on Wireless Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE/ACM Transactions on Networking (TON)
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Deposit-case attack against secure roaming
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Self-certified mutual authentication and key exchange protocol for roaming services
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
Mutual authentication and key exchange protocols with anonymity property for roaming services
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
A simple and efficient conference scheme for mobile communications
WISA'05 Proceedings of the 6th international conference on Information Security Applications
International Journal of Network Management
Hi-index | 0.01 |
A simple authentication technique for use in the global mobility network (GLOMONET) is proposed. This technique is based on the concept of distributed security management, i.e., the original security manager administrates the original authentication key (long-term secret key) acquired when a user makes a contract with his home network, while a temporary security manager is generated for a roaming user in the visited network that provides roaming services. The temporary security manager will take the place of the original security manager when the roaming user stays in the service area of the visited network. In the proposed authentication protocol for the regular communication phase, the procedures of the original security manager and the temporary security manager are the same except for introducing different parameters. Furthermore, the proposed technique not only reduces the number of transmissions during the authentication phase, but it also can decrease the complexity of mobile equipment. The idea behind the proposed technique is to introduce a simple mechanism which is called "self-encryption". We also suggest that this mechanism can be easily adopted as the authentication function for the secure teleconference service.