An Improvement on An Efficient Mobile Authentication Scheme for Wireless Networks

Jian-Zhu Lu, Xiuwei Fan, Jipeng Zhou, Hao Yang

Abstract


Mobile communication network has brought us great convenience. However, network security issues are outstanding increasingly. Authentication is the most essential procedure for preventing illegitimate, unauthorized or insecure devices from making access to the network. Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This paper strengthens the security of the scheme by authenticating the identity of visited location register such that any adversary cannot obtain the communication key between a mobile user and a service provider, or prevent them from establishing this key. An improvement is proposed to remedy these flaws. Our design is a less strong requirement for a mobile user MS in the communication cost than that of Tang and Wu's.

 

DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3706

 


Keywords


elliptic-curve cryptography; mutual authentication; mobile communication; security

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics