Skip to main content

A New Hybrid Authentication Protocol to Secure Data Communications in Mobile Networks

  • Chapter
Modeling Approaches and Algorithms for Advanced Computer Applications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 488))

  • 1432 Accesses

Abstract

The growing area of lightweight devices, such as mobile cell phones, PDA conduct to the rapid growth of mobile networks, they are playing important role in everyone’s day. Mobile Networks offer unrestricted mobility and tender important services like M-business, M-Learning, where, such services need to keep security of data as a top concern. The root cause behind the eavesdroppers in these networks is the un-authentication. Designing authentication protocol for mobile networks is a challenging task, because, mobile device’s memory, processing power, bandwidths are limited and constrained. Cryptography is the important technique to identify the authenticity in mobile networks. The authentication schemes for this networks use symmetric or asymmetric mechanisms. In this paper, we propose a hybrid authentication protocol that is based on Elliptic Curve Cryptography which is, actually, the suitable technique for mobile devices because of its small key size and high security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huber, J.F.: Mobile next-generation networks. IEEE MultiMedia (2004)

    Google Scholar 

  2. Nicolas SIMON : Sécurité Dans Les Smartphones, memoir. Free university of Bruxelles, 11–37 (2007)

    Google Scholar 

  3. Neonakis Aggelou, G.: On the relaying capability of next-generation GSM cellular networks. IEEE Personal Communications (2001)

    Google Scholar 

  4. Tatli, E.I.: Security in Context-awareMobile Business Applications, pp. 11–15. Mannheim University (2008)

    Google Scholar 

  5. Beghriche, A., Bilami, A.: Modélisation et Gestion de la Confiance dans les Réseaux Mobiles Ad hoc, CIIA (2009)

    Google Scholar 

  6. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic CurveCryptography. Springer (2004)

    Google Scholar 

  7. Rajeswari, G., Thilagavathi, K.: A Novel Protocol For Indirect Authentication. In: Mobile Networks Based On Elliptic Curve Cryptography, JATIT (2009)

    Google Scholar 

  8. Aydos, M., Yanık, T., Koc, Ç.K.: An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor ∗. IEE Pro.: Comms (2001)

    Google Scholar 

  9. Molva, R., Samfat, D.: Tsudik: Authentication of Mobile Users. IEEE Network 8(2), 26–34 (1994)

    Article  Google Scholar 

  10. Stojmenovic, I.: Handbook of Wireless Networks and Mobile Computing, 87–109 (2002)

    Google Scholar 

  11. Günther, H., Kheith, M., Chiris, J.: Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vehicular Technology 2 (2002)

    Google Scholar 

  12. Rajeswari, G., Thilagavathi, K.: An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks. IJCSNS 9(2) (2009)

    Google Scholar 

  13. Tzeng, Z.-J., Tzeng, W.-G.: Authentication of Mobile Users in Third Generation Mobile Systems. National Chiao Tung University (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mouchira Bensari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bensari, M., Bilami, A. (2013). A New Hybrid Authentication Protocol to Secure Data Communications in Mobile Networks. In: Amine, A., Otmane, A., Bellatreche, L. (eds) Modeling Approaches and Algorithms for Advanced Computer Applications. Studies in Computational Intelligence, vol 488. Springer, Cham. https://doi.org/10.1007/978-3-319-00560-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-00560-7_24

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-00559-1

  • Online ISBN: 978-3-319-00560-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics