Abstract
Use of mobile personal computers in open networked environment is revolutionalising the way we use computers. Mobile networked computing is raising important information security and privacy issues. This paper is concerned with the design of authentication protocols for a mobile computing environment. The paper first analyses the authentication initiator protocols proposed by Beller, Chang and Yacobi (BCY) and the modifications considered by Carlsen and points out some weaknesses. The paper then suggests improvements to these protocols. The paper proposes secure end-to-end protocols between mobile users using both symmetric and public key based systems. These protocols enable mutual authentication and establish a shared secret key between mobile users. Furthermore, these protocols provide a certain degree of anonymity of the communicating users to be achieved vis-a-vis other system users.
Preview
Unable to display preview. Download preview PDF.
References
Beller, M. J., Chang, L.-F., Yacobi, Y.: Privacy and authentication on a portable communications system. IEEE Journal on Selected Areas in Communications 11 (1993) 821–829.
Beller, M. J., Yacobi, Y.: Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters 29 (1993) 999–1001.
Carlsen, U.: Optimal privacy and authentication on a portable communications system. ACM Operating Systems Review 28 (1994) 16–23.
Cox, D. C.: Portable digital radio communication — an approach to tetherless access. IEEE Communications Magazine 27 (1990).
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Info. Theory 22 (1976) 644–654.
Hardjono, T., Seberry, J.:. Information security issues in mobile computing. In Proceedings of IFIP Sec'95 (1995) pp. 143–155.
Rabin, M. O.:. Digitalized signatures and public-key functions as intractable as factorization. Tech. Rep. TR 212 MIT Lab. Computer Science, Cambridge., Mass. Jan. 1979.
Varadharajan, V., Mu, Y.:. Authentication of mobile communications systems. In Proceedings of the 1996 IFIP Mobile Communication Conference (Sept 1996).
Varadharajian, V.:. Security for personal mobile networked computing. In Proceedings of the International Conference on Mobile and Personal Communications Systems (Australia, April 1995).
Williams, H. C.: A modification of RAS public-key encryption. IEEE Trans. Info. Theory IT-26 (1980) 726–729.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mu, Y., Varadharajan, V. (1996). On the design of security protocols for mobile communications. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023294
Download citation
DOI: https://doi.org/10.1007/BFb0023294
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61991-8
Online ISBN: 978-3-540-49583-3
eBook Packages: Springer Book Archive