Abstract
Numerous authentication approaches have been proposed recently for the global mobility network (GLOMONET), which provides mobile users with global roaming services. In these authentication schemes, the home network operators can easily obtain the authentication key and wiretap the confidentiality between the roaming user and the visited network. This investigation provides a solution of authentication techniques for GLOMONET in order to prevent this weakness from happening and presents a secure authentication protocol for roaming services. In addition, a round-efficient version of the same authentication protocol is presented. Comparing with other related approaches, the proposed authentication protocol involves fewer messages and rounds in communication.
Similar content being viewed by others
References
S. Suzuki and K. Nakada, “An Authentication Technique Based on Distributed Security Management for the Global Mobility Network”, IEEE J. Select. Areas Commun., Vol. 15, pp. 1608–1617, Oct. 1997.
L. Buttyan, C. Gbaguidi, S. Staaman, and U. Wilhelm, “Extensions to an Authentication Technique Proposed for the Global Mobility Network”, IEEE Trans. Commun., Vol. 48, pp. 373–376, Mar. 2000.
A. Merotra and L. Golding, “Mobility and Security Management in the GSM System and Some Proposed Future Improvements”, Proc. IEEE, Vol. 86, pp. 1480–1496, July 1998.
K.-F. Hwang and C.-C. Chang, “A Self-Encryption Mechanism for Authentication of Roaming and Teleconferences Services”, IEEE Trans. Wireless Commun., Vol. 2, pp. 400–407, Mar. 2003.
M. Xu and S. Upadhyaya, “Secure Communication in PCS”, in Proc. of the IEEE Vehicular Technology Conference, pp. 2193–2197, May 2001.
N. A. El-Fishway, M. A. Nofal, and A. M. Tadros, “An Improvement on Secure Communication in PCS”, in Proc. of the IEEE Performance, Computing, and Communications Conference, pp. 175–182, April 2003.
H.-Y. Lin and L. Harn, “Authentication Protocols with Non-Repudiation Services in Personnel Communication Systems”, IEEE Communications Letters, Vol. 3, No. 8, pp. 236–238, Aug. 1999.
W.-S. Juang, C.-L. Lei, and C.-Y. Chang, “Anonymous Channel and Authentication in Wireless Communications”, Computer Communications, Vol. 22, pp. 1502–1511, 1999.
C.-C. Lee, M.-S. Hwang, and W.-P. Yang, “Extension of Authentication Protocol for GSM”, IEE Proc.-Commun., Vol. 150, No. 2, April 2003.
L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, “Efficient Authentication and Key Distribution in Wireless IP Networks”, IEEE Wireless Communications, pp. 52–61, Dec. 2003.
W.-G. Tzeng and Z.-J. Tzeng, “Round-Efficient Conference Key Agreement Protocols with Provable Security”, in Proc. of Advances in Cryptology – Asiacrypt 2000, pp. 614–627, 2001.
W.-G. Tzeng, “A Secure Fault-Tolerant Conference-Key Agreement Protocol”, IEEE Trans. Computers, Vol. 51, No. 4, pp. 373–379, 2002.
W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Trans. Info. Theory, Vol. 22, No. 6, pp. 644–654, 1976.
D. L. Mills, “Precision Synchronization of Computer Network Clocks”, ACM Comput. Commun. Rev., Vol. 24, No. 1, pp. 28–43, January 1994.
D. L. Mills, “Adaptive Hybrid Clock Discipline Algorithm for the Network Time Protocol”, IEEE/ACM Trans. Networking, Vol. 6, pp. 505–514, 1998.
M. Mock, R. Frings, E. Nett, and S. Trikaliotis, “Clock Synchronization for Wireless Local Area Networks”, in Proc. of the 12th Euromicro Conference on Real Time Systems, pp. 183–189, June 2000.
Author information
Authors and Affiliations
Corresponding author
Additional information
Tian-Fu Lee was born in Tainan, Taiwan, ROC, in 1969. He received his B.S. degree in Applied Mathematics from National Chung Hsing University, Taiwan, in 1992, and his M.S. degree in Computer Science and Information Engineering from National Chung Cheng University, Taiwan, in 1998. He works as a lecturer in Leader University and pursues his Ph.D. degree at Department of Computer Science and Information Engineering, National Cheng Kung University, Taiwan. His research interests include cryptography and network security.
Chi-Chao Chang received the BS degree in Microbiology from Soochow University in 1990 and the MS degree in Computer Science from State University of New York at Albany in 1992. He is currently working as an instructor in Chang Jung Christian University and a graduate student in National Cheng Kung University. His research interests are information security, mobile agent systems, anonymous digital signatures and quantum cryptography.
Tzonelih Hwang was born in Tainan, Taiwan, in March 1958. He received his undergraduate degree from National Cheng Kung University, Tainan, Taiwan, in 1980, and the M.S. and Ph.D. degrees in Computer Science from the University of Southwestern Louisiana, USA, in 1988. He is presently a professor in Department of Computer Science and Information Engineering, National Cheng Kung University. His research interests include cryptology, network security, and coding theory.
Rights and permissions
About this article
Cite this article
Lee, TF., Chang, CC. & Hwang, T. Private Authentication Techniques for the Global Mobility Network. Wireless Pers Commun 35, 329–336 (2005). https://doi.org/10.1007/s11277-005-6177-z
Issue Date:
DOI: https://doi.org/10.1007/s11277-005-6177-z