Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
- 156 Downloads
Many protocols have been proposed for solving the user authentication in portable communication system. One of the schemes is based on the delegation concept. Home Location Register (HLR) delegates Mobile Station (MS) to be authenticated by Visitor Location Register (VLR). The main drawback of the scheme is that the HLR is required during the online authentication phase between VLR and MS. In this paper, a double delegation-based authentication and key agreement protocol is proposed. The main advantage of our protocol is that this scheme requires only MS and VLR online. This protocol will thoroughly utilize the proxy signature features to facilitate the operation of this protocol while only requires two members (MS, VLR) to be online at the same time.
KeywordsDelegation Authentication Key agreement PCS Mobile communication
This study was supported by the National Science Council of Taiwan under grant NSC101-2221-E-179-001. The authors gratefully acknowledge the anonymous reviewers for their valuable comments.
- 1.Lee, W.-B., & Yeh, C.-K. (2008). A self-concealing mechanism for authentication of portable communication systems. International Journal of Network Security, 6(2), 285–290.Google Scholar
- 6.Yeh, C.-K., & Lee, W.-B. (2009). An overall cost-effective authentication technique for the global mobility network. International Journal of Network Security, 9(3), 227–232.Google Scholar
- 8.Lee, C.-H., Hwang, M.-S., Yang, W.-P. (1999). Enhanced privacy and authentication for the global system of mobile communications. Wireless Networks, 5, 231–243.Google Scholar
- 10.Lee, C.-C., Lin, T.-C., Tzeng, S.-F., & Hwang, M.-S. (2011). Generalization of proxy signature based on factorization. International Journal of Innovative Computing, Information and Control, 7(3), 1039–1054.Google Scholar
- 11.Lee, T.-F., Chang, S.-H., Hwang, T., & Chong, S.-K. (2009). Enhanced delegation-based authentication protocol for PCSs. IEEE Transactions on Wireless Communications, 8(5), 2166–6171.Google Scholar
- 14.Moldovyan, N. A., & Moldovyan, A. A. (2010). Blind collective signature protocol based on discrete logarithm problem. International Journal of Network Security, 11(2), 106–113.Google Scholar
- 19.Das, M. L., Saxena, A., & Phatak, D. B. (2009). Algorithms and approaches of proxy signature: A survey. International Journal of Network Security, 9(3), 264–284.Google Scholar
- 20.Mashhadi, S. (2012). A novel secure self proxy signature scheme. International Journal of Network Security, 14(1), 22–26.Google Scholar
- 21.Mambo, M., Usuda, K., & Okamoto, E. (1996). Delegation of the power to sign messages. IEEE Transactions on Fundamentals, E79–A, 1338–1353.Google Scholar
- 22.Liu, J., & Li, J. (2010). A better improvement on the integrated Diffie-Hellman-DSA key agreement protocol. International Journal of Network Security, 11(2), 114–117.Google Scholar