An optimized authentication protocol for mobile networks

Practical secure communication of mobile systems with low communication cost has become one of the major research directions. An established public key infrastructure (PKI) provides key management and key distribution mechanisms, which can lead to authentication and secure communication. Adding public key cryptography to Kerberos provides a nice congruence to public key protocols, which can obviate the human users’ burden to manage strong passwords. This paper emphasizes on authentication as a considerable issue related to security. Additionally, an efficient and secure hybrid authentication protocol for large mobile network is proposed. Its infrastructure accommodates explosive growth of the large mobile network. It reduces the communication cost for providing secure network access in inter-domain communication. This method is based on symmetric cryptosystem, PKI, challenge–response and hash chaining.

[1]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[2]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[3]  Randy Chow,et al.  An efficient and secure authentication protocol using uncertified keys , 1995, OPSR.

[4]  Andre Scedrov,et al.  Breaking and fixing public-key Kerberos , 2006, Inf. Comput..

[5]  Gabriel López Millán,et al.  Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations , 2011, Comput. Stand. Interfaces.

[6]  Stephen T. Kent,et al.  A public-key based secure mobile IP , 1997, MobiCom '97.

[7]  Hung-Yu Chien,et al.  A hybrid authentication protocol for large mobile network , 2003, J. Syst. Softw..

[8]  Sam Hartman,et al.  A Generalized Framework for Kerberos Pre-Authentication , 2011, RFC.

[9]  J.J. Tardo,et al.  SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Ravi Ganesan,et al.  Yaksha: augmenting Kerberos with public key cryptography , 1995, Proceedings of the Symposium on Network and Distributed System Security.

[11]  Larry Zhu,et al.  Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) , 2006, RFC.

[12]  Minkyu Kim A Survey of Kerberos V and Public-Key Kerberos Security , 2009 .

[13]  Qiang Tang,et al.  Cryptanalysis of a hybrid authentication protocol for large mobile networks , 2006, J. Syst. Softw..

[14]  Marvin A. Sirbu,et al.  Distributed authentication in Kerberos using public key cryptography , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.