With the global deployment of portable communication systems and the ongoing developments in this area, one expects more and more sophisticated security features to be provided such as entity authentication, robust user identity confidentiality and non-repudiation services. Motivated by these new security requirements, this article analyzes the security of authentication protocols in several mobile communication industry standards, such as DAMPS, GSM, and TETRA, and several proposals for future mobile communication systems. A new authentieation protocol is presented to provide the above security services using symmetrie cryptographic techniques only. The security and complexity of the new protocol are analyzed and compared with the aforementioned protocols.B. Preneel (ed.), Secure Information Networks