An efficient authentication protocol with user anonymity for mobile networks

WCNC(2013)

引用 16|浏览16
暂无评分
摘要
Existing mobile authentication protocols are low in efficiency, because asymmetric encryption algorithms with large computational overheads are employed in these protocols to ensure user anonymity. In addition, the existing mobile authentication protocols have a long delay in fast reconnection, because these protocols may suffer from desynchronization attacks. In order to solve these problems, an efficient mutual authentication protocol with user anonymity for mobile networks is proposed. The proposed protocol ensures user anonymity by using one-way hash function. It reduces the delay time in fast reconnection, because once the session key between the mobile user and the foreign agent is found to be desynchronized in reconnection process, mobile users start the process of login and authentication from a new beginning immediately. The security of the proposed protocol is proved by using the provable security model. Compared with several existing authentication protocols for mobile networks, the proposed protocol is more secure and more effective.
更多
查看译文
关键词
delay time reduction,desynchronization attacks,fast reconnection,mobile communication,mobile user,asymmetric encryption algorithms,one-way hash function,foreign agent,radio networks,mobile authentication protocols,mutual authentication,security model,cryptographic protocols,large computational overheads,telecommunication security,efficient mutual authentication protocol,reconnection process,user anonymity,mobile networks,mobile computing,smart cards,authentication,semantics,protocols
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要