Information Security and Privacy

Volume 1438 of the series Lecture Notes in Computer Science pp 344-355


Key establishment protocols for secure mobile communications: A selective survey

  • Colin BoydAffiliated withInformation Security Research Centre, School of Data Communications, Queensland University of Technology
  • , Anish MathuriaAffiliated withTokyo Research Laboratory, IBM Research

* Final gross prices may vary according to local VAT.

Get Access


We analyse several well-known key establishment protocols for mobile communications. The protocols are examined with respect to their security and suitability in mobile environments. In a number of cases weaknesses are pointed out, and in many cases refinements are suggested, either to improve the efficiency or to allow simplified security analysis.