End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication

  • Authors:
  • Chin-Chen Chang;Kuo-Lun Chen;Min-Shiang Hwang

  • Affiliations:
  • Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 62107, R.O.C.;Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 62107, R.O.C.;Department of Management Information System, National Chung Hsing University, 250 Kuo Kuang Road, 402 Taichung, Taiwan, R.O.C. E-mail: mshwang@nchu.edu.tw

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

As great progress has been made in mobile communications, manyrelated researches on this topic have been proposed. In most ofthe proposed protocols so far, it has been assumed that the personusing the mobile station is the registrar of the SIM card;as a matter of, the previous protocols forauthentication and session key distribution are built upon thisassumption. This way, the mobile user can only verify the identityof the owner of the SIM card. This means that the mobile user canonly know that who registers the SIM card with which hecommunicates. Note that the human voice can be forged. To makesure that the speaker at the other end is the right owner of theSIM card, concept of the password is involved to constructthe end-to-end security authentication protocol. In the proposedprotocol, each mobile user can choose a password. When twomobile users want to communicate with each other, either user canrequest to perform a end-user identification process. Only when bothof the end users input the correct passwords can thecorrect common session key be established.