Skip to main content
Log in

Private Authentication Techniques for the Global Mobility Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Numerous authentication approaches have been proposed recently for the global mobility network (GLOMONET), which provides mobile users with global roaming services. In these authentication schemes, the home network operators can easily obtain the authentication key and wiretap the confidentiality between the roaming user and the visited network. This investigation provides a solution of authentication techniques for GLOMONET in order to prevent this weakness from happening and presents a secure authentication protocol for roaming services. In addition, a round-efficient version of the same authentication protocol is presented. Comparing with other related approaches, the proposed authentication protocol involves fewer messages and rounds in communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. S. Suzuki and K. Nakada, “An Authentication Technique Based on Distributed Security Management for the Global Mobility Network”, IEEE J. Select. Areas Commun., Vol. 15, pp. 1608–1617, Oct. 1997.

    Google Scholar 

  2. L. Buttyan, C. Gbaguidi, S. Staaman, and U. Wilhelm, “Extensions to an Authentication Technique Proposed for the Global Mobility Network”, IEEE Trans. Commun., Vol. 48, pp. 373–376, Mar. 2000.

    Article  Google Scholar 

  3. A. Merotra and L. Golding, “Mobility and Security Management in the GSM System and Some Proposed Future Improvements”, Proc. IEEE, Vol. 86, pp. 1480–1496, July 1998.

    Google Scholar 

  4. K.-F. Hwang and C.-C. Chang, “A Self-Encryption Mechanism for Authentication of Roaming and Teleconferences Services”, IEEE Trans. Wireless Commun., Vol. 2, pp. 400–407, Mar. 2003.

    Google Scholar 

  5. M. Xu and S. Upadhyaya, “Secure Communication in PCS”, in Proc. of the IEEE Vehicular Technology Conference, pp. 2193–2197, May 2001.

  6. N. A. El-Fishway, M. A. Nofal, and A. M. Tadros, “An Improvement on Secure Communication in PCS”, in Proc. of the IEEE Performance, Computing, and Communications Conference, pp. 175–182, April 2003.

  7. H.-Y. Lin and L. Harn, “Authentication Protocols with Non-Repudiation Services in Personnel Communication Systems”, IEEE Communications Letters, Vol. 3, No. 8, pp. 236–238, Aug. 1999.

    Google Scholar 

  8. W.-S. Juang, C.-L. Lei, and C.-Y. Chang, “Anonymous Channel and Authentication in Wireless Communications”, Computer Communications, Vol. 22, pp. 1502–1511, 1999.

    Google Scholar 

  9. C.-C. Lee, M.-S. Hwang, and W.-P. Yang, “Extension of Authentication Protocol for GSM”, IEE Proc.-Commun., Vol. 150, No. 2, April 2003.

  10. L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, “Efficient Authentication and Key Distribution in Wireless IP Networks”, IEEE Wireless Communications, pp. 52–61, Dec. 2003.

  11. W.-G. Tzeng and Z.-J. Tzeng, “Round-Efficient Conference Key Agreement Protocols with Provable Security”, in Proc. of Advances in Cryptology – Asiacrypt 2000, pp. 614–627, 2001.

  12. W.-G. Tzeng, “A Secure Fault-Tolerant Conference-Key Agreement Protocol”, IEEE Trans. Computers, Vol. 51, No. 4, pp. 373–379, 2002.

    MathSciNet  Google Scholar 

  13. W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Trans. Info. Theory, Vol. 22, No. 6, pp. 644–654, 1976.

    MathSciNet  Google Scholar 

  14. D. L. Mills, “Precision Synchronization of Computer Network Clocks”, ACM Comput. Commun. Rev., Vol. 24, No. 1, pp. 28–43, January 1994.

    Google Scholar 

  15. D. L. Mills, “Adaptive Hybrid Clock Discipline Algorithm for the Network Time Protocol”, IEEE/ACM Trans. Networking, Vol. 6, pp. 505–514, 1998.

    Article  MathSciNet  Google Scholar 

  16. M. Mock, R. Frings, E. Nett, and S. Trikaliotis, “Clock Synchronization for Wireless Local Area Networks”, in Proc. of the 12th Euromicro Conference on Real Time Systems, pp. 183–189, June 2000.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzonelih Hwang.

Additional information

Tian-Fu Lee was born in Tainan, Taiwan, ROC, in 1969. He received his B.S. degree in Applied Mathematics from National Chung Hsing University, Taiwan, in 1992, and his M.S. degree in Computer Science and Information Engineering from National Chung Cheng University, Taiwan, in 1998. He works as a lecturer in Leader University and pursues his Ph.D. degree at Department of Computer Science and Information Engineering, National Cheng Kung University, Taiwan. His research interests include cryptography and network security.

Chi-Chao Chang received the BS degree in Microbiology from Soochow University in 1990 and the MS degree in Computer Science from State University of New York at Albany in 1992. He is currently working as an instructor in Chang Jung Christian University and a graduate student in National Cheng Kung University. His research interests are information security, mobile agent systems, anonymous digital signatures and quantum cryptography.

Tzonelih Hwang was born in Tainan, Taiwan, in March 1958. He received his undergraduate degree from National Cheng Kung University, Tainan, Taiwan, in 1980, and the M.S. and Ph.D. degrees in Computer Science from the University of Southwestern Louisiana, USA, in 1988. He is presently a professor in Department of Computer Science and Information Engineering, National Cheng Kung University. His research interests include cryptology, network security, and coding theory.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, TF., Chang, CC. & Hwang, T. Private Authentication Techniques for the Global Mobility Network. Wireless Pers Commun 35, 329–336 (2005). https://doi.org/10.1007/s11277-005-6177-z

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-005-6177-z

Keywords

Navigation