2005
DOI: 10.1007/s11277-005-6177-z
|View full text |Cite
|
Sign up to set email alerts
|

Private Authentication Techniques for the Global Mobility Network

Abstract: Numerous authentication approaches have been proposed recently for the global mobility network (GLOMONET), which provides mobile users with global roaming services. In these authentication schemes, the home network operators can easily obtain the authentication key and wiretap the confidentiality between the roaming user and the visited network. This investigation provides a solution of authentication techniques for GLOMONET in order to prevent this weakness from happening and presents a secure authentication … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…For instance, Long et al [3] in 2004 presented a localized authentication protocol for inter-network roaming across wireless LANs. Lee et al [4] in 2005 proposed a private authentication protocol to prevent the home location register (HLR) from eavesdropping on communications between the roaming station (MS) and the visited location register (VLR). However, due to hardware limitations, MS cannot support heavy encryption and decryption, and therefore wastes a lot of time in exponential computations.…”
mentioning
confidence: 99%
“…For instance, Long et al [3] in 2004 presented a localized authentication protocol for inter-network roaming across wireless LANs. Lee et al [4] in 2005 proposed a private authentication protocol to prevent the home location register (HLR) from eavesdropping on communications between the roaming station (MS) and the visited location register (VLR). However, due to hardware limitations, MS cannot support heavy encryption and decryption, and therefore wastes a lot of time in exponential computations.…”
mentioning
confidence: 99%
“…For instance, long et al [17] in 2004 presented a localized authentication protocol for inter-network roaming across wireless LANs. Lee et al [18] in 2005 proposed a private authentication protocol to prevent the home location register (HLR) from eavesdropping on communication between the roaming station (MS) and the visited location register (VLR). However, due to hardware limitations, MS cannot support heavy encryption and decryption, and therefore wastes a lot of time in exponential computations.…”
Section: Related Workmentioning
confidence: 99%
“…For allowing people to get connected seamlessly using their mobile devices without being limited by the geographical coverage of their own home networks, roaming services have been deployed, for example, GMS [6][7][8][9], 3GPP [10], and WLANs. A typical roaming scenario involves three parties: a roaming Mobile Station (MS), a Visited Location Register (VLR) and a Home Location Register (HLR).…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many anonymous authentication scheme (e.g. [22,12,21,2,13,6,14,19,7,8]) have been proposed for roaming services in GLOMONET. However, most of the existing protocols were broken shortly after they were proposed.…”
Section: Introductionmentioning
confidence: 99%