Abstract-Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects mobile users privacy in the roaming network environment. One-time session key progression frequently renews the session key for mobile users and reduces the risk of using a compromised session key to communicate with visited networks. It has demonstrated that the computation complexity of the proposed protocols is similar to the existing ones, while the security has been significantly improved.
A novel authentication protocol for teleconference service is proposed. The main features of the proposed protocol include identity anonymity, one-time Pseudonym Identity (PID) renewal and location intracability. Identity anonymity is achieved by concealing the real identity of a mobile conferee in a prearranged PID. One-time PID Renewal mechanism, in which the mobile conferee's PID is frequently updated communicating with the network centre, is introduced to offer location intracability. It is shown that the security has been significantly enhanced, while the computation complexity is similar to the existing ones appeared in the literature.
Abstract-In this paper, an agent-based integrated service model for wireless local area network (WLAN)/cellular networks and the relevant authentication and event tracking for billing support schemes are proposed. The service model does not require inefficient peer-to-peer roaming agreements to provide seamless user roaming between the WLAN hotspots and the cellular networks, which are operated by independent wireless network service providers. The proposed authentication and event-tracking schemes take the anonymity and intractability of mobile users into consideration and operate independently so that the integrated billing service can be applied to the cellular network, even if it still uses a traditional authentication scheme. Security analysis and overhead evaluation are given to demonstrate that the proposed service model and the supporting schemes are secure and efficient.Index Terms-Authentication, roaming, service agent (SA), wireless local area network (WLAN)/cellular integrated network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.