Abstract
Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network (GLOMONET). The proposed protocols have new features, such as identity anonymity and one-time session key progression. Identity anonymity protects mobile users’ privacy in the roaming network environment. One-time session key progression frequently renews the session key for mobile users and reduces the risk of using a compromised session key to communicate with visited networks. It is shown that the computation complexity of the proposed protocols is similar to the existing one appeared in the literature, while the security has been significantly enhanced.
Chapter PDF
Similar content being viewed by others
References
Suzukiz, S., Nakada, K.: An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications 15(8), 1606–1617 (1997)
Tzeng, Z.J., Tzeng, W.G.: Authentication of mobile users in third generation mobile system. Wireless Personal Communication 16(2), 35–50 (2002)
Buttyan, L., Gbaguidi, C., et al.: Extensions to an authentication technique proposed for the global mobility network. IEEE Trans. on Communication 48(3), 373–376 (2000)
Hwang, K.F., Chang, C.C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. on Wireless Communications 2(2), 400–407 (2003)
Horn, G., Preneel, B.: Authentication and payment in future mobile system. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 277–293. Springer, Heidelberg (1998)
Wong, D.S., Chan, A.H.: Mutual authentication and key exchange for low power wireless communications. In: Proc. of IEEE Military Communications Conference, MILCOM 2001, vol. 1, pp. 39–43 (2001)
Ng, S.L., Mitchell, C.: Comments on mutual authentication and key exchange protocols for low power wireless communications. IEEE Communications Letters 8(4), 262–263 (2004)
Saeednia, S.: Identity-based and Self-certified Key Exchange Protocols. In: Proc. of the Second Australian Conference on Information Security and Privacy, pp. 303–313 (1997)
Saeednia, S.: A note on Girault’s self-certified model. Information Processing Letters 86(6), 323–327 (2003)
Schneier, B.: Applied cryptography: protocols, algorithm, and source code C, 2nd edn., pp. 70–72. John Wiely & Sons, Inc., West Sussex (1996)
Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)
Adelman, R.L., McCurley, K.S.: Open problem in number theoretic complexity. In: Proc. of the 1994 Algorithmic Number Theory Symposium, pp. 291–322. Springer, Heidelberg (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiang, Y., Lin, C., Shen, X., Shi, M. (2005). Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. In: Boutaba, R., Almeroth, K., Puigjaner, R., Shen, S., Black, J.P. (eds) NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems. NETWORKING 2005. Lecture Notes in Computer Science, vol 3462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11422778_10
Download citation
DOI: https://doi.org/10.1007/11422778_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25809-4
Online ISBN: 978-3-540-32017-3
eBook Packages: Computer ScienceComputer Science (R0)