2006
DOI: 10.1109/twc.2006.05063
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks

Abstract: Abstract-Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects mobile users privacy in the roaming network environment. One-time session key progression frequently renews the session key for mobile users and reduces the risk of using a compromised session key to communicate with visite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 96 publications
(53 citation statements)
references
References 18 publications
0
53
0
Order By: Relevance
“…When a group of MTC devices roam from 3GPP network to WiMAX network which belongs to different operator domains, or vice versa, the access authentication must be performed by the corresponding access networks which are regulated by their respective home authentication servers. Numerous authentication protocols dedicated for 3GPP-WLAN or WiMAX-WLAN interworking architecture have been proposed, such as [5], [9], [10], [11], [12], [13]. However, there is few research work dealing with authentication issues for 3GPP-WiMAX interworking architecture; moreover, most of the existing protocols are based on symmetric cryptosystem (e.g., EAP-based authentication and key agreement).…”
Section: Introductionmentioning
confidence: 99%
“…When a group of MTC devices roam from 3GPP network to WiMAX network which belongs to different operator domains, or vice versa, the access authentication must be performed by the corresponding access networks which are regulated by their respective home authentication servers. Numerous authentication protocols dedicated for 3GPP-WLAN or WiMAX-WLAN interworking architecture have been proposed, such as [5], [9], [10], [11], [12], [13]. However, there is few research work dealing with authentication issues for 3GPP-WiMAX interworking architecture; moreover, most of the existing protocols are based on symmetric cryptosystem (e.g., EAP-based authentication and key agreement).…”
Section: Introductionmentioning
confidence: 99%
“…Upon receiving the registration request, HA generates a secret m-bits random number N MU for MU and records the mapping relation of MU's pseudonym identity PID MU and N MU (PID MU ↔ N MU ). The concept of the pseudonym identity is firstly introduced in [13]. To defeat the exhaustive search attack, m should be sufficiently large, e.g., 256 bits.…”
Section: Registration Phasementioning
confidence: 99%
“…The MT is preapproved to use the network resources of the FA when the message reaches the BH, or eventually the FA, that has the credit record. The BH and the FA decrypt Message (7) Depending on which has the authentication record first, the BH sends both the MT and the FA or the FA sends the MT Message (8), and the MT starts to send data in Message (9). After the FA grants the access of the MT, the FA continues step 2 and step 3 mentioned earlier to authenticate the MT with the HA.…”
Section: B Authentication Scheme In Detailsmentioning
confidence: 99%
“…User anonymity and intractability are important security property, which can be achieved by adopting similar user identity replacement proposed in [9] at signalling level in the proposed authentication with jointly using other privacy hiding techniques at Internet Protocol (IP) and Medium Access Control (MAC) levels.…”
Section: A Robustness Of Proposed Authentication Schemesmentioning
confidence: 99%