An efficient authentication protocol supporting privacy in mobile computing environments

The anticipated increase in mobility and popular use of mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol that provides mobile hosts with the functionalities of authentication and session key distribution for user privacy and secure communication. Considering mobile computing environments, our protocol has design principles such as reducing computation and communication overhead of mobile hosts, and uses random numbers, time-stamps, and authentication codes in order to protect systems from attacks by eavesdroppers. While our protocol supports authentication, secure communication, anonymity, and untraceability for mobile hosts, it can be an efficient authentication protocol for mobile computing environments.

[1]  Paul Francis,et al.  Fast routing table lookup using CAMs , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.

[2]  Colin Boyd,et al.  Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.

[3]  Daxiao Yu,et al.  Forwarding engine for fast routing lookups and updates , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).

[4]  Jung-Joon Kim,et al.  Security requirements of next generation wireless communications , 1998, ICCT'98. 1998 International Conference on Communication Technology. Proceedings (IEEE Cat. No.98EX243).

[5]  Chia-Tai Chan,et al.  A fast IP routing lookup scheme , 2001, IEEE Communications Letters.

[6]  W.-S. Juang,et al.  Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..

[7]  Bill Warner Book Review: Interconnections: Bridges and Routers by Radia Perlman (Addison-Wesley Publishing Company, Inc.) , 1993, CCRV.

[8]  Butler W. Lampson,et al.  IP lookups using multiway and multicolumn search , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[9]  Nick McKeown,et al.  Routing lookups in hardware at memory access speeds , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[10]  A. Mehrotra,et al.  Mobility and security management in the GSM system and some proposed future improvements , 1998, Proc. IEEE.

[11]  G Pierce,et al.  Recent Developments in Digital Wireless Network Security , 1996 .

[12]  George Varghese,et al.  Memory-efficient state lookups with fast updates , 2000, SIGCOMM 2000.

[13]  Gene Tsudik,et al.  KryptoKnight Authentication and Key Distribution System , 1992, ESORICS.

[14]  Radia Perlman Interconnections: Bridges and Routers , 1992 .

[15]  Chi-Chun Lo,et al.  Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..

[16]  Svante Carlsson,et al.  Small forwarding tables for fast routing lookups , 1997, SIGCOMM '97.

[17]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[18]  Farnam Jahanian,et al.  Internet routing instability , 1997, SIGCOMM '97.

[19]  Chang-Seop Park On certificate-based security protocols for wireless mobile communication systems , 1997 .

[20]  G. Tsudik,et al.  Authentication of mobile users , 1994, IEEE Network.

[21]  Hugo Krawczyk,et al.  Security issues in a CDPD wireless network , 1995, IEEE Wirel. Commun..