Skip to main content

Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications

  • Conference paper

Abstract

Ubiquitous connectivity faces interoperation issues between wireless network providers when authenticating visiting users. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are based on roaming agreement to exchange authentication information between the home network and a foreign network. This paper proposes Passport/Visa approach that consists of two tokens: Passport (authentication token) and Visa (authorisation token), to provide a flexible authentication method for foreign networks to authenticate mobile users. Our approach can be used when there is no roaming agreement between foreign networks and the mobile user’s home network. The security analysis indicates that our protocol is resistant to well-known attacks, ant it efficiently ensures the security for both mobile users and network providers. The performance analysis also demonstrated that the proposed protocol will greatly enhance computation, and communication cost.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. GSM Association: 20 Facts for 20 Years of Mobile Communications (2007), http://www.gsmtwenty.com/20facts.pdf (Date accessed: October 31, 2010)

  2. Patel, B., Crowcroft, J.: Ticket based service access for the mobile user. In: MobiCom 1997: Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 223–233. ACM, NY (1997)

    Google Scholar 

  3. Wang, H., Zhang, Y., Cao, J., Varadharajan, V.: Achieving secure and flexible m-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics 33, 697–708 (2003)

    Article  Google Scholar 

  4. Tuladhar, S., Caicedo, C., Joshi, J.: Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), pp. 249–255. IEEE Computer Society, Washington, DC (2008)

    Chapter  Google Scholar 

  5. Almuhaideb, A., Alhabeeb, M., Le, P.D., Srinivasan, B.: Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens. Journal of Telecommunications 1, 1–10 (2010)

    Google Scholar 

  6. Almuhaideb, A., Alharbi, T., Alhabeeb, M., Le, P.D., Srinivasan, B.: Toward a Ubiquitous Mobile Access Model: A roaming agreement-less approach. In: SNPD 2010: the 11th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, June 9-11. IEEE Computer Society, London (2010)

    Google Scholar 

  7. Shrestha, A., Choi, D., Kwon, G., Han, S.: Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. Computers & Mathematics with Applications (2010)

    Google Scholar 

  8. Matsunaga, Y., Merino, A., Suzuki, T., Katz, R.: Secure authentication system for public WLAN roaming. In: Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, pp. 113–121. ACM, New York (2003)

    Chapter  Google Scholar 

  9. Chakravorty, R., Agarwal, S., Banerjee, S., Pratt, I.: MoB: a mobile bazaar for wide-area wireless services. In: MobiCom 2005: Proceedings of the 11th Annual International Conference on Mobile Computing and Networking, pp. 228–242. ACM, New York (2005)

    Google Scholar 

  10. Sirbu, M.A., Chuang, J.C.I.: Distributed authentication in Kerberos using public keycryptography. In: Proceedings Symposium on Network and Distributed System Security, pp. 134–141 (1997)

    Google Scholar 

  11. Lee, B., Kim, T., Kang, S.: Ticket based authentication and payment protocol for mobile telecommunications systems, pp. 218–221 (2001)

    Google Scholar 

  12. Shin, M., Ma, J., Arbaugh, W.: The Design of Efficient Internetwork Authentication for Ubiquitous Wireless Communications. Network 3, 1 (2004)

    Google Scholar 

  13. Lei, Y., Quintero, A., Pierre, S.: Mobile services access and payment through reusable tickets. Computer Communications (2008)

    Google Scholar 

  14. Syverson, P., Cervesato, I.: The logic of authentication protocols. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 63–137. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Chen, Y., Chuang, S., Yeh, L., Huang, J.: A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Almuhaideb, A., Le, P.D., Srinivasan, B. (2012). Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 73. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29154-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29154-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29153-1

  • Online ISBN: 978-3-642-29154-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics