Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets

被引:21
|
作者
Hwang, Tzonelih [1 ]
Gope, Prosanta [2 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
[2] Natl Cheng Kung Univ, Tainan 70101, Taiwan
关键词
Authentication; Key exchange; One-time-secret; Transaction sequence number; GSM; UMTS;
D O I
10.1007/s11277-013-1501-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The Universal Mobile Telecommunication Standard (UMTS) is continuously evolving to meet the increasing demand of modern mobile and Internet applications for high capacity and advanced features in security and quality of service. Although admittedly enhanced in terms of security as compared to GSM (2G) systems, UMTS still has some weaknesses that may often lead to several security incidents. In this article, we come up with a novel authentication mechanism based on the one-time-secret security capabilities, which can assure an expeditious mobile communication environment and simultaneously be able to deal with the several issues related to security vulnerabilities (Redirection Attack, Man-in-the-Middle-Attack) and others like the excessive bandwidth consumption, storage overhead in VLR etc. existing in the current mobile communication (UMTS). In addition, here we also introduce a new concept called "Neighborhood Policy", where several VLRs can form groups among themselves and carry out significant responsibilities in order to authenticate a User without interfering HLRs even though the User moves to a new VLR (belongs to the same group). We argue that the proposed solution not only achieves the mutual authentication in a secure manner, but at the same time, it also greatly reduces the computation and communication cost of the mobile User as compared to the existing state of the art authentication schemes.
引用
收藏
页码:197 / 224
页数:28
相关论文
共 50 条
  • [1] Provably Secure Mutual Authentication and Key Exchange Scheme for Expeditious Mobile Communication Through Synchronously One-Time Secrets
    Tzonelih Hwang
    Prosanta Gope
    Wireless Personal Communications, 2014, 77 : 197 - 224
  • [2] Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications
    Fan, Chun-I
    Ho, Pei-Hsiu
    Hsu, Ruei-Hau
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (03) : 996 - 1009
  • [3] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [4] Provably secure three party encrypted key exchange scheme with explicit authentication
    Tsai, Hao-Chuan
    Chang, Chin-Chen
    INFORMATION SCIENCES, 2013, 238 : 242 - 249
  • [5] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Xu, Dongqing
    Zhang, Shu
    Chen, Jianhua
    Ma, Mimi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 837 - 847
  • [6] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Dongqing Xu
    Shu Zhang
    Jianhua Chen
    Mimi Ma
    Peer-to-Peer Networking and Applications, 2018, 11 : 837 - 847
  • [7] A secure and efficient one-time password authentication scheme for WSN
    Ling C.-H.
    Lee C.-C.
    Yang C.-C.
    Hwang M.-S.
    Hwang, Min-Shiang (mshwang@ asia. edu.tw), 1600, Femto Technique Co., Ltd. (19): : 177 - 181
  • [8] Quantum secure communication scheme with one-time pad
    Xiao, Heling
    Guo, Wangmei
    Wang, Xiao
    Journal of Convergence Information Technology, 2012, 7 (18) : 109 - 115
  • [9] One-time packet key exchange scheme for secure real-time multimedia applications
    Jung, Younchan
    Festijo, Enrique
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) : 1584 - 1596
  • [10] Towards a Secure Mutual Authentication and Key Exchange Protocol for Mobile Communications
    He, Yijun
    Lee, Moon-Chuen
    2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 216 - 222