Is Entity Authentication Necessary?
Conventionally, mutual entity authentication is seen as the necessary precursor to the establishment of a secure connection. However, there exist examples of cases where authentication is not needed. The purpose of this paper is to consider this proposition, illustrated by case studies, and to use the findings of this investigation as input for the design of authentication protocols suitable for use in future Internet access environments supporting ubiquitous mobility.
KeywordsMobile User Authentication Protocol Home Network Message Authentication Code Entity Authentication
Unable to display preview. Download preview PDF.
- 2.Walker, M., Wright, T.: Security. In: Hillebrand, F. (ed.) GSM and UMTS: The creation of global mobile communication, pp. 385–406. John Wiley & Sons, Chichester (2002)Google Scholar
- 3.Sutton, R.: Secure communications: Applications and management. John Wiley & Sons, Chichester (2002)Google Scholar
- 4.Mitchell, C.: The security of the GSM air interface protocol. Technical Report RHUL-MA-2001-3, Mathematics Department, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK (2001), Available at http://www.ma.rhul.ac.uk/techreports
- 5.Third Generation Partnership Project: 3GPP TS 33.102: Security Architecture. V3.11.0 edn, Technical Specification Group Services and System Aspects, 3G Security, Valbonne, France (2002)Google Scholar