Provably secure and efficient authentication techniques for the global mobility network

Recently, several authentication techniques have been developed for the global mobility network (GLOMONET), which provides mobile users with global roaming services. Due to the hardware limitations, the mobile user cannot support the heavy encryption and decryption. This investigation adjusts the entity in the roaming scenario that selects the session key to be used to different types of authentication schemes in GLOMONET and presents two provably secure and efficient authentication protocols for roaming services. One protocol is based on synchronized clocks, while the other uses random numbers. Compared to related approaches, the proposed authentication protocols not only reduce the number of transmissions, but also diminish the computational cost involved in encryption and decryption. Thus, they are more suitable for GLOMONET.

[1]  Chin-Chen Chang,et al.  A self-encryption mechanism for authentication of roaming and teleconference services , 2003, IEEE Trans. Wirel. Commun..

[2]  C.-H. Wu,et al.  Localised authentication for inter-network roaming across wireless LANs , 2004 .

[3]  Tzonelih Hwang,et al.  Private Authentication Techniques for the Global Mobility Network , 2005, Wirel. Pers. Commun..

[4]  Li Gong,et al.  Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.

[5]  Wei-Bin Lee,et al.  A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.

[6]  Shigefusa Suzuki,et al.  An Authentication Technique Based on Distributed Security Management for the Global Mobility Network , 1997, IEEE J. Sel. Areas Commun..

[7]  Victor Shoup,et al.  Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..

[8]  David L. Mills,et al.  Adaptive hybrid clock discipline algorithm for the network time protocol , 1998, TNET.

[9]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[10]  David L. Mills,et al.  Precision synchronization of computer network clocks , 1994, CCRV.

[11]  Edgar Nett,et al.  Clock synchronization for wireless local area networks , 2000, Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000.

[12]  Shahrokh Saeednia,et al.  A note on Girault's self-certified model , 2003, Inf. Process. Lett..

[13]  Levente Buttyán,et al.  Extensions to an authentication technique proposed for the global mobility network , 2000, IEEE Trans. Commun..

[14]  Li Gong,et al.  A security risk of depending on synchronized clocks , 1992, OPSR.

[15]  Tzong-Chen Wu,et al.  Improvement of Saeednia's self-certified key exchange protocols , 1998 .

[16]  Xuemin Shen,et al.  Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks , 2006, IEEE Transactions on Wireless Communications.

[17]  Shahrokh Saeednia Identity-Based and Self-Certified Key-Exchange Protocols , 1997, ACISP.

[18]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[19]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.