메뉴 건너뛰기




Volumn 7, Issue 4, 2008, Pages 1408-1416

An efficient mobile authentication scheme for wireless networks

Author keywords

Denial of service attack; Elliptic curve cryptosystems; False base station attack; Message en route attack; Mobile authentication

Indexed keywords

DENIAL-OF-SERVICE ATTACK; ELLIPTIC-CURVE CRYPTOSYSTEMS; FALSE BASE STATION ATTACK; MESSAGE EN ROUTE ATTACK; MOBILE AUTHENTICATION;

EID: 58149108946     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2008.061080     Document Type: Article
Times cited : (89)

References (26)
  • 3
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B. C. Neuman and T. Ts'o, "Kerberos: an authentication service for computer networks", IEEE Commun. Mag., vol. 32, no. 9. pp. 33-38, 1994.
    • (1994) IEEE Commun. Mag , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 4
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communications system
    • Aug
    • M. J. Beller, L.-F. Chang, and Y. Yacobi, "Privacy and authentication on a portable communications system", IEEE J. Select. Areas Commun., vol. 11, no. 6, pp. 821-829, Aug. 1993.
    • (1993) IEEE J. Select. Areas Commun , vol.11 , Issue.6 , pp. 821-829
    • Beller, M.J.1    Chang, L.-F.2    Yacobi, Y.3
  • 5
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • Q. He, D. Wu, and P. Khosla, "Quest for personal control over mobile location privacy", IEEE Commun. Mag., vol. 42, no. 5, pp. 130-136, 2004.
    • (2004) IEEE Commun. Mag , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 6
    • 19944362854 scopus 로고    scopus 로고
    • A new delegation-based authentication protocol for use in portable communication systems
    • W.-B. Lee and C.-K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems", IEEE Trans. Wireless Commun., vol. 4, no. 1, pp. 57-64, 2005.
    • (2005) IEEE Trans. Wireless Commun , vol.4 , Issue.1 , pp. 57-64
    • Lee, W.-B.1    Yeh, C.-K.2
  • 7
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, "Password authentication with insecure communication", Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 8
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • Aug
    • A. Evans, W. Kantrowitz, and W. Weiss, "A user authentication scheme not requiring secrecy in the computer", Commun. ACM, vol. 17, no. 8, pp. 437-442, Aug. 1974.
    • (1974) Commun. ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans, A.1    Kantrowitz, W.2    Weiss, W.3
  • 9
    • 0029717329 scopus 로고    scopus 로고
    • Proxy signatures for delegating signing operation
    • M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation", in Proc. 3rd ACM CCS, 1996, pp. 48-57.
    • (1996) Proc. 3rd ACM CCS , pp. 48-57
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 10
    • 84957014368 scopus 로고
    • Discrete logarithm in finite fields and their cryptographic significance
    • Spinger-Verlag
    • A. M. Odlyzko, "Discrete logarithm in finite fields and their cryptographic significance", in Proc. Eurocrypt. Spinger-Verlag, 1985, pp. 224-314.
    • (1985) Proc. Eurocrypt , pp. 224-314
    • Odlyzko, A.M.1
  • 11
    • 84948137719 scopus 로고    scopus 로고
    • Extended proxy signature for smart card
    • Spinger-Verlag
    • T. Okamoto, M. Tada, and E. Okamoto, "Extended proxy signature for smart card", in LNCS 1729. Spinger-Verlag, 1999, pp. 247-258.
    • (1999) LNCS , vol.1729 , pp. 247-258
    • Okamoto, T.1    Tada, M.2    Okamoto, E.3
  • 12
    • 84958751721 scopus 로고    scopus 로고
    • Secure mobile agent using strong nondesignated proxy signature
    • Springer-Verlag
    • B. Lee, H. Kim, and K. Kim, "Secure mobile agent using strong nondesignated proxy signature", in LNCS 2119). Springer-Verlag, 2001, pp. 474-486.
    • (2001) LNCS , vol.2119 , pp. 474-486
    • Lee, B.1    Kim, H.2    Kim, K.3
  • 15
    • 0010029876 scopus 로고    scopus 로고
    • Efficient arithmetic on koblitz curves
    • J. A. Solinas, "Efficient arithmetic on koblitz curves", Designs, Codes and Cryptography, vol. 19, no. 2, pp. 195-249, 2000.
    • (2000) Designs, Codes and Cryptography , vol.19 , Issue.2 , pp. 195-249
    • Solinas, J.A.1
  • 16
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Mar
    • M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol", IEEE Trans. Wireless Commun., vol. 4, no. 2, pp. 734-742, Mar. 2005.
    • (2005) IEEE Trans. Wireless Commun , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 17
    • 58149115768 scopus 로고    scopus 로고
    • Security architecture, version 4.2.0, release 4. Third Generation Partnership Project - Technical Specification Group
    • TS 33.102
    • (2001) TS 33.102: Security architecture, version 4.2.0, release 4. Third Generation Partnership Project - Technical Specification Group.
  • 18
    • 58149104605 scopus 로고    scopus 로고
    • TR 33.902: Formal analysis of the 3g authentication protocol. Third Generation Partnership Project - Authentication and Key Agreement (AKA).
    • (2000) TR 33.902: Formal analysis of the 3g authentication protocol. Third Generation Partnership Project - Authentication and Key Agreement (AKA).
  • 19
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)", International J. Inform. Security, vol. 1, no. 1, pp. 36-63. 2001.
    • (2001) International J. Inform. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 20
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers", Commun. ACM, vol. 21, no. 12, pp. 993-999, Dec. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 23
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Aug
    • D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols", Commun. ACM, vol. 24, no. 8, pp. 533-536, Aug. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 25
    • 0000874415 scopus 로고
    • Limitations of the Kerberos authentication system
    • Oct
    • S. M. Bellovin and M. Merritt, "Limitations of the Kerberos authentication system", ACM Comput. Commun. Review, vol. 20, no. 5, pp. 119-132, Oct. 1990.
    • (1990) ACM Comput. Commun. Review , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 26
    • 0038670954 scopus 로고    scopus 로고
    • Software implementation of elliptic curve cryptography over binary fields
    • Springer-Verlag
    • D. Hankerson, J. L. Hernandez, and A. Menezes, "Software implementation of elliptic curve cryptography over binary fields", in Proc. CHES 2000 (LNCS 1965). Springer-Verlag, 2000, pp. 1-24.
    • (2000) Proc. CHES 2000 (LNCS 1965) , pp. 1-24
    • Hankerson, D.1    Hernandez, J.L.2    Menezes, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.