Abstract
The main contributions of this paper are: (1) to analyze an authentication and key distribution protocol for mobile computing proposed by Beller, Chang and Yacobi in 1993, and reveal two problems associated with their protocol. (2) to propose a new authentication and key distribution protocol that utilizes a broadcast channel in a mobile network. A particularly interesting feature of the new proposal is that it allows the authentication of a base station by a mobile user to be conducted “at the background”, which yields a very compact protocol whose total number of moves of information between a mobile user and a base station is only 1.5 !
Chapter PDF
Similar content being viewed by others
References
Asokan, N. (1994), Anonymity in a mobile computing environment, in ‘Proceedings of 1994 IEEE Workshop on Mobile Computing Systems and Applications’.
Aziz, A. & Diffie, W. (1994), ‘Privacy and authentication for wireless local area networks’, IEEE Personal Communications 1 (1), 25 – 31.
Beller, M., Chang, L.-F. & Yacobi, Y. (1993), ‘Privacy and authentication on a portable communications system’, IEEE Journal on Selected Amas in Communications 11 (6), 821 – 829.
Brown, D. (1995), ‘Techniques for privacy and authentication in personal communications systems’, IEEE Personal Communications 2 (4), 6 – 10.
Chokhani, S. (1994), ‘Toward a national public key infrastructure’, IEEE Communications Magazine pp. 70 – 74.
Diffie, W. & Hellman, M. (1976), ‘New directions in cryptography’, IEEE Transactions on Information Theory IT-22(6), 472–492.
Frankel, Y., Herzberg, A., Karger, P., Krawczyk, H., Kunzinger, C. & Yung, M. (1995), ‘Security issues in a CDPD wireless network’, IEEE Personal Communications 2 (4), 16 – 27.
Herzberg, A., Krawczyk, H. & Tsudik, G. (1994), On travelling incognito, in Proceedings of 1994 IEEE Workshop on Mobile Computing Systems and Applications’.
ITU (1993), Information technology - open systems interconnection - the directory: Authentication framework, Recommendation X.509, International Telecommunications Union.
Lai, X. (1992), On the Design and Security of Block Ciphers, ETH Series in Information Processing, Hartung-Gorre Verlag Konstanz, Zürich.
Molva, R., Samfat, D. & Tsudik, G. (1994), ‘Authentication of mobile users’, IEEE Network.
National Bureau of Standards (1977), Data encryption standard, Federal Information Processing Standards Publication FIPS PUB 46, U.S. Department of Commerce.
National Institute of Standards and Technology (1994), Digital signature standard (DSS), Federal Information Processing Standards Publication FIPS PUB 186, U.S. Department of Commerce.
National Institute of Standards and Technology (1995), Secure hash standard, Federal Information Processing Standards Publication FIPS PUB 180 – 1, U.S. Department of Commerce
Rahnema, M. (1993), ‘Overview of the GSM system and protocol architecture’, IEEE Communications Magazine pp. 92 – 100.
Samfat, D., Molva, R. & Asokan, N. (1995), Untraceability in mobile networks, in ‘Proceedings of MobiCom’95’.
Schnorr, C. P. (1991), ‘Efficient signature generation by smart cards’, Journal of Cryptology 4 (3), 161 – 174.
Wilkes, J. (1995), ‘Privacy and authentication needs of PCS’, IEEE Personal Communications 2 (4), 11 – 15.
Zheng, Y. (1996), The SPEED cipher’. Submitted for publication.
Zheng, Y., Pieprzyk, J. & Seberry, J. (1993), HAVAL - a one-way hashing algorithm with varialbe length of output, in J. Seberry & Y. Zheng, eds, ‘Advances in Cryptology - AUSCRYPT’92’, Vol. 718 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, New York, Tokyo, pp. 83 – 104.
Zheng, Y. & Seberry, J. (1993), ‘Immunizing public key cryptosystems against chosen ciphertext attacks’, IEEE Journal on Selected Areas in Communications 11 (5), 715 – 724.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Zheng, Y. (1996). An Authentication and Security Protocol for Mobile Computing. In: Encarnação, J.L., Rabaey, J.M. (eds) Mobile Communications. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34980-0_25
Download citation
DOI: https://doi.org/10.1007/978-0-387-34980-0_25
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5857-3
Online ISBN: 978-0-387-34980-0
eBook Packages: Springer Book Archive