Abstract
The growing area of lightweight devices, such as mobile cell phones, PDA conduct to the rapid growth of mobile networks, they are playing important role in everyone’s day. Mobile Networks offer unrestricted mobility and tender important services like M-business, M-Learning, where, such services need to keep security of data as a top concern. The root cause behind the eavesdroppers in these networks is the un-authentication. Designing authentication protocol for mobile networks is a challenging task, because, mobile device’s memory, processing power, bandwidths are limited and constrained. Cryptography is the important technique to identify the authenticity in mobile networks. The authentication schemes for this networks use symmetric or asymmetric mechanisms. In this paper, we propose a hybrid authentication protocol that is based on Elliptic Curve Cryptography which is, actually, the suitable technique for mobile devices because of its small key size and high security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Huber, J.F.: Mobile next-generation networks. IEEE MultiMedia (2004)
Nicolas SIMON : Sécurité Dans Les Smartphones, memoir. Free university of Bruxelles, 11–37 (2007)
Neonakis Aggelou, G.: On the relaying capability of next-generation GSM cellular networks. IEEE Personal Communications (2001)
Tatli, E.I.: Security in Context-awareMobile Business Applications, pp. 11–15. Mannheim University (2008)
Beghriche, A., Bilami, A.: Modélisation et Gestion de la Confiance dans les Réseaux Mobiles Ad hoc, CIIA (2009)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic CurveCryptography. Springer (2004)
Rajeswari, G., Thilagavathi, K.: A Novel Protocol For Indirect Authentication. In: Mobile Networks Based On Elliptic Curve Cryptography, JATIT (2009)
Aydos, M., Yanık, T., Koc, Ç.K.: An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor ∗. IEE Pro.: Comms (2001)
Molva, R., Samfat, D.: Tsudik: Authentication of Mobile Users. IEEE Network 8(2), 26–34 (1994)
Stojmenovic, I.: Handbook of Wireless Networks and Mobile Computing, 87–109 (2002)
Günther, H., Kheith, M., Chiris, J.: Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vehicular Technology 2 (2002)
Rajeswari, G., Thilagavathi, K.: An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks. IJCSNS 9(2) (2009)
Tzeng, Z.-J., Tzeng, W.-G.: Authentication of Mobile Users in Third Generation Mobile Systems. National Chiao Tung University (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Bensari, M., Bilami, A. (2013). A New Hybrid Authentication Protocol to Secure Data Communications in Mobile Networks. In: Amine, A., Otmane, A., Bellatreche, L. (eds) Modeling Approaches and Algorithms for Advanced Computer Applications. Studies in Computational Intelligence, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-00560-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-00560-7_24
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-00559-1
Online ISBN: 978-3-319-00560-7
eBook Packages: EngineeringEngineering (R0)