A Hybrid Mobile Authentication Model for Ubiquitous Networking

被引:2
作者
Almuhaideb, Abdullah [1 ]
Srinivasan, Bala [2 ]
Phu Dung Le [2 ]
Alhabeeb, Mohammed [3 ]
Alfehaid, Waleed [3 ]
机构
[1] King Faisal Univ, Coll Comp Sci & IT, Alahsa, Saudi Arabia
[2] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
[3] Minist Interior, Natl Informat Ctr, Riyadh, Saudi Arabia
来源
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 | 2015年
关键词
Authentication model; roaming agreement establishment; ubiquitous networking; wireless roaming protocols; ROAMING SERVICES; KEY AGREEMENT; WIRELESS; SECURITY; PROTOCOLS; EXCHANGE;
D O I
10.1109/Trustcom.2015.395
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The development in mobile devices and wireless technologies (e.g Cellular, Wi-Fi) has facilitated a growth in mobile services. As mobile users are usually moving, roaming services are deployed to allow users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, such as performance issues and security vulnerabilities. In this paper a novel hybrid mobile authentication model is proposed, with its realisation through suitable protocols that combine the advantages of both distributed and centralised models. The proposed Passport and Visa tokens assist a foreign network in authenticating and authorising visiting mobile users. These tokens also offer a unique solution to achieving secure and efficient key management. Most importantly, the proposed solution provides an efficient technique, using recency evidence (a Passport Stamp), to tackle the problem of a user revocation status check. The security and performance analysis demonstrates that the proposed protocols efficiently ensure secure roaming, greatly enhance computation speed, and reduce communication costs.
引用
收藏
页码:360 / 367
页数:8
相关论文
共 28 条
[1]   A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems [J].
Akyildiz, IF ;
Mohanty, S ;
Xie, J .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (06) :S29-S36
[2]   Two-Party Mobile Authentication Protocols for Wireless Roaming Networks [J].
Almuhaideb, Abdullah ;
Phu Dung Le ;
Srinivasan, Bala .
2011 10TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2011,
[3]  
Almuhaideb A., 2012, P MOBIQUITOUS 10 SYD, P224
[4]  
Almuhaideb AM, 2012, PROC 1 INT C SECURIT, P126
[5]   Reducing reauthentication delay in wireless networks [J].
Aura, T ;
Roe, M .
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, :139-148
[6]   Extensions to an authentication technique proposed for the global mobility network [J].
Buttyán, L ;
Gbaguidi, C ;
Staamann, S ;
Wilhelm, W .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2000, 48 (03) :373-376
[7]   An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks [J].
Chang, Chin-Chen ;
Tsai, Hao-Chuan .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) :3346-3353
[8]   A practical authentication protocol with anonymity for wireless access networks [J].
Chen, Yen-Cheng ;
Chuang, Shu-Chuan ;
Yeh, Lo-Yao ;
Huang, Jiun-Long .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (10) :1366-1375
[9]   Advanced user authentication for mobile devices [J].
Clarke, N. L. ;
Furnell, S. M. .
COMPUTERS & SECURITY, 2007, 26 (02) :109-119
[10]  
Dandash Osama, 2008, Journal of Networks, V3, P25, DOI 10.4304/jnw.3.1.25-34