Skip to main content
Log in

An optimized authentication protocol for mobile networks

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Practical secure communication of mobile systems with low communication cost has become one of the major research directions. An established public key infrastructure (PKI) provides key management and key distribution mechanisms, which can lead to authentication and secure communication. Adding public key cryptography to Kerberos provides a nice congruence to public key protocols, which can obviate the human users’ burden to manage strong passwords. This paper emphasizes on authentication as a considerable issue related to security. Additionally, an efficient and secure hybrid authentication protocol for large mobile network is proposed. Its infrastructure accommodates explosive growth of the large mobile network. It reduces the communication cost for providing secure network access in inter-domain communication. This method is based on symmetric cryptosystem, PKI, challenge–response and hash chaining.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chien HY, Jan JK (2003) A hybrid authentication protocol for large mobile network. J Syst Softw 67(2003):123–130

    Article  Google Scholar 

  2. Cervesato I, Jaggard AD, Scedrov A, Tsay J-K, Walstad C (2008) Breaking and fixing public-key Kerberos. Inf Comput 206:402–424

    Article  MATH  MathSciNet  Google Scholar 

  3. Ganesan R (1995) Yaksha: augmenting Kerberos with public key cryptography. In: SNDSS_95: Proceedings of the 1995 symposium on network and distributed system security. IEEE Computer Society, pp 132–143

  4. Hartman S, Zhu L (2010) A Generalized framework for Kerberos pre-authentication. IETF internet draft, draft-ietf-krb-wgpreauthframework-17

  5. IETF (1996–2006) Public Key cryptography for initial authentication in Kerberos, RFC 4556, Preliminary versions available as a sequence of Internet Drafts at http://tools.ietf.org/wg/krb-wg/draft-ietf-cat-kerberos-pk-init/

  6. Kohl J, Neuman C (1993) The Kerberos Network Authentication Service (V5), IETF RFC 1510

  7. Kao IL, Chow R (1995) An efficient and secure authentication protocol using uncertified keys. ACM Oper Syst Rev 29(3):14–21

    Article  Google Scholar 

  8. Lopez DR et al (2011) Providing EAP-based Kerberos pre-authentication and advanced authorization for network federations. Comput Stand Interfaces 33:494–504

    Article  Google Scholar 

  9. Minkyu K (2009) A survey of Kerberos V and public-key Kerberos security, http://www1.cse.wustl.edu/jain/cse571%E2%80%9309/ftp/kerb5/index.html

  10. Perkins CE (2002) IP mobility support for IPv4. RFC 3344

  11. Sirbu MA, Chuang JCI (1997) Distributed authentication in Kerberos using public key cryptography. In: Proceedings of the 1997 symposium on network and distributed system security. IEEE Computer Society, pp 134–141

  12. Tang Q, Mitchell CJ (2006) Cryptanalysis of a hybrid authentication protocol for large mobile networks. J Syst Softw 79:496–501

    Article  Google Scholar 

  13. The MIT Kerberos Consortium. http://www.kerberos.org. MIT Kerberos Distribution. http://web.mit.edu/Kerberos/

  14. Tardo J, Alagappan K. (1991) SPX: Global authentication using public key certificates. In: Proceedings of the 1991 IEEE symposium on research in security and privacy

  15. Zao J, Kent S, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I (1999) A public-key based secure mobile IP. Wirel Netw 5(5):373–390

    Article  Google Scholar 

  16. Zhu L, Tung B (2006) Public key cryptography for initial authentication in Kerberos (PKINIT). IETF RFC 4556

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reza Eslamipoor.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mahshid, MK., Eslamipoor, R. An optimized authentication protocol for mobile networks. Neural Comput & Applic 25, 379–385 (2014). https://doi.org/10.1007/s00521-013-1496-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-013-1496-6

Keywords

Navigation