An Improvement on An Efficient Mobile Authentication Scheme for Wireless Networks
Abstract
Mobile communication network has brought us great convenience. However, network security issues are outstanding increasingly. Authentication is the most essential procedure for preventing illegitimate, unauthorized or insecure devices from making access to the network. Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This paper strengthens the security of the scheme by authenticating the identity of visited location register such that any adversary cannot obtain the communication key between a mobile user and a service provider, or prevent them from establishing this key. An improvement is proposed to remedy these flaws. Our design is a less strong requirement for a mobile user MS in the communication cost than that of Tang and Wu's.
DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3706
Keywords
elliptic-curve cryptography; mutual authentication; mobile communication; security
Full Text:
PDFRefbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).