Authentication protocols for personal communication systems
- 1 October 1995
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGCOMM Computer Communication Review
- Vol. 25 (4) , 256-261
- https://doi.org/10.1145/217391.217456
Abstract
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of the communication should be enciphered and mutual authentication should be conducted between the subscriber and the serving network. Several protocols have been proposed by standards bodies and independent researchers in recent years to counteract these threats. However, the strength of these protocols is usually weakened in the roaming environment where the security breach of a visited network could lead to persistent damages to subscribers who visit. The subscriber's identity is not well protected in most protocols, and appropriate mechanisms solving disputes on roaming bills are not supported either. To solve these problems, new authentication protocols are proposed in this paper with new security features that have not been fully explored before.Keywords
This publication has 11 references indexed in Scilit:
- Fast implementations of RSA cryptographyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Optimal privacy and authentication on a portable communications systemACM SIGOPS Operating Systems Review, 1994
- Authentication of mobile usersIEEE Network, 1994
- Privacy and authentication for wireless local area networksIEEE Wireless Communications, 1994
- Privacy and authentication on a portable communications systemIEEE Journal on Selected Areas in Communications, 1993
- Scalable, secure, mobile computing with location informationCommunications of the ACM, 1993
- Security planning for personal communicationsPublished by Association for Computing Machinery (ACM) ,1993
- Cryptographic security techniques for digital mobile telephonesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1992
- A logic of authenticationACM Transactions on Computer Systems, 1990
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978