An Authentication Protocol for Mobile Users
نویسنده
چکیده
Mobile networks need additionnal security functions in contrast to traditional xed-topology static-user networks. In fact, a new problem involving mobility is that users are able to access the network at multiple points which can be separated by signiicant geographic distances and many diierent administrative boundaries. As these access points are not necessarily under the control of a single administrative authority, a new set of inter-domain mechanisms is needed in order to allow users to perform security operations in visited domains, providing they obtain an agreement from their home domain. Even if this requirement is obvious, the corresponding solutions should however take into account a somewhat contradictory security constraint that calls for strict partitioning of security domains in order to avoid sharing domain-speciic security information among several domains. In this paper, we suggest a generic solution for the authentication of users in visited domains that maintains the domain separation property. The advantage of the protocols described herein is they may be adapted to both wireless networks and traditional wireline networks supporting mobility.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملVAS-AKA: First Symmetric Batch Verification Protocol for Securely Deliver Value Added Services to Multiple Mobile Users
We introduce an efficient batch oriented authentication and key agreement (AKA) protocol named VAS-AKA to authenticate multiple requests sent from different mobile users simultaneously for value added services. The performance evaluation of VAS-AKA is presented in terms of communication and computation overhead, batch and re-batch verification delay. Using this protocol, the authentication serv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1994