Abstract

This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols (2) and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attack. Moreover, the mobile station only needs to receive one message and send one message to authenticate itself to a visitor's location register, and the model only requires a single elliptic-curve scalar point multiplication on a mobile device. Therefore, this model enjoys both computation efficiency and communication efficiency as compared to known mobile authentication models.

Highlights

  • SEAMLESS inter-network operation is highly desirable to mobile users, and security such as authentication of mobile stations is challenging in this type of networks.A mobile station (MS) out of its home network needs to be authenticated to be allowed to access a visited network; in general there is no trusted authentication server available to the MS out of its home network

  • We propose a trust-delegation based Mobile Authentication Model (MAM) which is invulnerable to all known attacks including the DoS attack, the message en route attack, and the false base station attack

  • We focused on the communication key exchanged between home location register (HLR) and visited location register (VLR) using Extended Password Key Exchange (EPKE) Protocol [2] .We have extended a smart-card delegation scheme to a delegation scheme based on the elliptic curve discrete logarithm problem, and this delegation scheme is amenable to fast implementation and it is used for the proposed mobile authentication to achieve great communication efficiency with a short key length and yet a strong level of security

Read more

Summary

INTRODUCTION

SEAMLESS inter-network operation is highly desirable to mobile users, and security such as authentication of mobile stations is challenging in this type of networks. The significant advantage of use of trust delegation on mobile authentication is that a scheme can exploit the public-key based strong security properties while achieving efficiency in communication and computation through the use of a single symmetric key. We propose a trust-delegation based Mobile Authentication Model (MAM) which is invulnerable to all known attacks including the DoS attack, the message en route attack (the message redirection attack), and the false base station attack. We focused on the communication key exchanged between HLR and VLR using EPKE Protocol [2] .We have extended a smart-card delegation scheme to a delegation scheme based on the elliptic curve discrete logarithm problem, and this delegation scheme is amenable to fast implementation and it is used for the proposed mobile authentication to achieve great communication efficiency with a short key length and yet a strong level of security. We will use trust delegation technique to solve this forwarding problem and in the meantime make the proposed scheme more efficient in terms of communications and computation

SECURITY AND EFFICIENCY IN MOBILE AUTHENTICATION
PROPOSED MOBILE AUTHENTICATION MODEL
SECURITY PROPERTIES OF MAM
EFFICIENCY AND IMPLEMENTATION ISSUES OF MAM
IMPLEMENTATION ISSUES OF THE SCHEME
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call