Private Authentication Techniques for the Global Mobility Network
Wireless Personal Communications: An International Journal
Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices
Wireless Personal Communications: An International Journal
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment
Wireless Personal Communications: An International Journal
A secure and efficient authentication scheme for mobile users
International Journal of Mobile Communications
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks
IEEE Communications Letters
International Journal of Wireless and Mobile Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE/ACM Transactions on Networking (TON)
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Self-certified mutual authentication and key exchange protocol for roaming services
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Mutual authentication and key exchange protocols with anonymity property for roaming services
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
International Journal of Network Management
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.07 |
This paper proposes an authentication technique for use in the global mobility network (GLOMONET), which provides a personal communication user with global roaming service. This technique is based on new distributed security management, where authentication management in roaming-service provision is conducted only by the roamed network (the visited network). The original security manager (OSM) administrates the original authentication key (OAK) acquired when a user makes contracts with the home network, while the temporary security manager (TSM) is generated for a roamer in the visited network in order to provide roaming services. The TSM generates and administrates the temporary authentication key (TAK) for a roamer, which key is confidential to the OSM, releases the TAK administration when a roamer moves to other networks, and then disappears. The proposed authentication technique consists of two phases. In the roaming-service-setup phase, triggered by the user's location registration request, authentication control to set up the roaming-service environment is negotiated by the TSM in the visited network, the OSM, and the roamer. In the roaming-service-provision phase, triggered by the user's service request, authentication control to provide the roaming service is negotiated (using the TAK acquired by the roamer in the first phase) only by the visited network and the roamer. This authentication control using the TAK provides a unified authentication procedure with a single logic to both subscribers and roamers. In addition, the security management of the whole GLOMONET is reinforced and the security responsibility is made clear by allocating the subscriber's/roamer's security administration to only the TSM