AN EXTENDED CERTIFICATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS

被引:0
作者
Lee, Cheng-Chi [1 ]
Liao, I-En [2 ]
Hwang, Min-Shiang [3 ]
机构
[1] Asia Univ, Dept Informat & Commun Engn, Taichung, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci, Taichung 402, Taiwan
[3] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2009年 / 38卷 / 01期
关键词
Authentication; key distribution; mobile communication; privacy; security; PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An optimized certificate-based protocol for mobile network with authentication and security has been proposed by Yi et al. This protocol allows efficient computation and less storage requirement in the mobile device. As a result, less power is consumed in the mobile device. However, in 1999, 2002, and 2003, Martin et al., Wong, and Laih et al. respectively showed that Yi et al.'s scheme is vulnerable to some attacks, but did not remedy these attacks. In this paper, we propose an improved protocol to remedy these attacks. Using the new protocol, the protection against attacks can be assured. The security of the key distribution on the mobile network is enhanced as well.
引用
收藏
页码:61 / 66
页数:6
相关论文
共 25 条
[1]   A new authentication protocol for GSM: Networks [J].
Al-Tawil, K ;
Akrami, A ;
Youssef, H .
23RD ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS - PROCEEDINGS, 1998, :21-30
[2]  
[Anonymous], INT J NETW SECUR
[3]  
[Anonymous], 2005, INT J NETW SECURITY
[4]  
[Anonymous], 2006, INT J NETWORK SECURI
[5]  
Aziz A., 1994, IEEE Personal Communications, V1, P25, DOI 10.1109/98.295357
[6]   PRIVACY AND AUTHENTICATION ON A PORTABLE COMMUNICATIONS-SYSTEM [J].
BELLER, MJ ;
CHANG, LF ;
YACOBI, Y .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (06) :821-829
[7]   End-to-end security protocol for mobile communications with end-user identification/authentication [J].
Chang, CC ;
Chen, KL ;
Hwang, MS .
WIRELESS PERSONAL COMMUNICATIONS, 2004, 28 (02) :95-106
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[10]   CONFERENCE KEY DISTRIBUTION SCHEMES FOR SECURE DIGITAL MOBILE COMMUNICATIONS [J].
HWANG, MS ;
YANG, WP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (02) :416-420