TY - JOUR
T1 - Strong roaming authentication technique for wireless and mobile networks
AU - He, Daojing
AU - Chen, Chun
AU - Chan, Sammy
AU - Bu, Jiajun
PY - 2013/8
Y1 - 2013/8
N2 - When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed privacy-preserving universal authentication protocol, Priauth, exceeds the security and efficiency of other authentication techniques. This paper studies the existing roaming authentication protocols and shows that they are not strong enough to provide secure roaming services in three aspects. Further, using Priauth as an example, we propose efficient remedies that fix the weaknesses. The experimental results show that the proposed approaches are feasible in practice. Copyright © 2012 John Wiley & Sons, Ltd. The key findings presented in the paper are as follows. (1) Existing roaming authentication protocols are not strong enough to provide secure roaming services in three aspects. (2) We propose efficient remedies that fix the weaknesses. The experimental results show that the proposed approaches are feasible in practice. © 2011 John Wiley & Sons, Ltd.
AB - When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed privacy-preserving universal authentication protocol, Priauth, exceeds the security and efficiency of other authentication techniques. This paper studies the existing roaming authentication protocols and shows that they are not strong enough to provide secure roaming services in three aspects. Further, using Priauth as an example, we propose efficient remedies that fix the weaknesses. The experimental results show that the proposed approaches are feasible in practice. Copyright © 2012 John Wiley & Sons, Ltd. The key findings presented in the paper are as follows. (1) Existing roaming authentication protocols are not strong enough to provide secure roaming services in three aspects. (2) We propose efficient remedies that fix the weaknesses. The experimental results show that the proposed approaches are feasible in practice. © 2011 John Wiley & Sons, Ltd.
KW - authentication
KW - roaming service
KW - security and privacy
KW - wireless and mobile networks
UR - http://www.scopus.com/inward/record.url?scp=84881388540&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84881388540&origin=recordpage
U2 - 10.1002/dac.1387
DO - 10.1002/dac.1387
M3 - RGC 21 - Publication in refereed journal
SN - 1074-5351
VL - 26
SP - 1028
EP - 1037
JO - International Journal of Communication Systems
JF - International Journal of Communication Systems
IS - 8
ER -