IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record
DOI: 10.1109/glocom.1991.188696
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and authentication on a portable communications system

Abstract: It is expected that, in the near future, Portable Communications Systems (PCSs) will provide wireless access to the wireline telephone network for a large number of telephone calls. PCSs transmit conversations via radio, making them more susceptible to eavesdropping than are conversations carried via wires. The mobility of PCS users also presents new problems relating to 1) authentication-ensuring service is not obtained fraudulently, and 2) the privacy of information about the PCS user's location. It is impor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
18
0

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 13 publications
0
18
0
Order By: Relevance
“…Thus, more and more attentions have been paid on the public-key based authentication schemes recently. In [7][8] [9][10], several public-key based AKA schemes including MSR+DH, Siemens, KPN, Boyd-Park and BCY have been proposed and analyzed for wireless networks. However, we argue that all of them have the following security defects: (1) Both ME and wireless access network (AN) have to exchange their public certificate over the air interface.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, more and more attentions have been paid on the public-key based authentication schemes recently. In [7][8] [9][10], several public-key based AKA schemes including MSR+DH, Siemens, KPN, Boyd-Park and BCY have been proposed and analyzed for wireless networks. However, we argue that all of them have the following security defects: (1) Both ME and wireless access network (AN) have to exchange their public certificate over the air interface.…”
Section: Related Workmentioning
confidence: 99%
“…PK AKA [7,8,9] Hybrid AKA [12,13] Mutual authentication between ME and AN The security of our scheme is based on the GPS [25] identification scheme, which was proposed by Girault and proven secure by Poupard and Stern [26]. The security analysis shows that if an attacker is able to forge valid signatures for a non-negligible fraction of the possible public keys then he is able to compute discrete logs mod N and therefore to factor N. On the other hand if an attacker is only able to forge signatures for a fixed key then he must be able to compute the discrete log of this key or to solve the so-called strong RSA problem as it was noticed by Camenisch and Michels in [27].…”
mentioning
confidence: 99%
“…The Beller-Chang-Yacobi protocol [4] and the Aziz-Diffie protocol [3] do not provide client identity confidentiality, while the Boyd-Park protocol [9] do not obtain perfect forward secrecy. Though the ASPeCT protocol provides perfect forward secrecy and client identity confidentiality, but it is susceptible to DoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Other prevention based mechanisms, using different techniques, have also been proposed in the research literature [3], [4]. Independently of the approach adopted, the objectives are to counteract security threats such as masquerading and eavesdropping.…”
Section: Introductionmentioning
confidence: 99%