preview

Passport/Visa Authentication Protocols for Ubiquitous Wireless Communications

Best Essays
Abstract—The development in mobile devices and wireless technologies opens up unlimited choices of mobile services such as mobile commerce. These advances make access services available and convenient everywhere at any time. Since mobile users usually move, accessing services becomes unavailable especially in some locations that are not covered by their home networks. Therefore, it becomes necessary to roam into foreign networks in order to access such services. However, authenticating visiting users by a foreign network results in some security concerns. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are either roaming agreement-based in exchanging authentication information between the home network and a foreign network or vulnerable to some security attacks. This paper proposes two roaming agreement-less protocols based on our ubiquitous mobile access model. This approach consists of two tokens: Passport (identification token) and Visa (authorisation token) to provide a flexible authentication method for foreign network to authenticate mobile users. The security analysis indicates that our proposal is more secure and suitable for ubiquitous mobile communications specially in roaming agreement-less enviroment.

Keywords: authentication, ubiquitous wireless access, security protocols, roaming agreement, telecommunication security.

Introduction

The advanced capabilities of mobile devices and wireless technologies facilitate accessing variety of services over the Internet: e-mail, mobile commerce and mobile banking. It becomes more desirable to mobile users (MU) to access these services wirelessly while they are o...

... middle of paper ...

...munications Magazine, vol. 43, pp. S29-S36, 2005.

[6] Y. Matsunaga, A. Merino, T. Suzuki, and R. Katz, "Secure authentication system for public WLAN roaming," 2003, pp. 113-121.

[7] M. Shin, J. Ma, and W. Arbaugh, "The Design of Efficient Internetwork Authentication for Ubiquitous Wireless Communications," Network, vol. 3, p. 1, 2004.

[8] D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu, "A strong user authentication scheme with smart cards for wireless communications," Computer Communications, 2010.

[9] Y. Chen, S. Chuang, L. Yeh, and J. Huang, "A practical authentication protocol with anonymity for wireless access networks," Wireless Communications and Mobile Computing, 2010.

[10] G. YANG, Q. HUANG, D. WONG, and X. DENG, "Universal Authentication Protocols for Anonymous Wireless Communications," IEEE Transactions on Wireless Communications, vol. 9, pp. 168-174, 2010.
Get Access