Provably secure mutual authentication and key agreement scheme with user anonymity

Tzone-Lih Hwang, Prosanta Gope

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

With the widespread use of several mobile gadgets, privacy and anonymity of the mobile subscriber becomes a major issue in mobile communication. Through the roaming technology of the global mobility networks, a legitimate subscriber can enjoy the ubiquitous services. Where, the mutual authentication and key agreement between the mobile subscriber and roaming network (VLR/SGSN) is the primary security aspect of many commercial mobile networks. For personal privacy perspective, it is important to develop a mutual authentication and key agreement scheme with several security features including the user anonymity. In this article, we come up with a novel authentication and key agreement scheme, which can assure privacy against eavesdroppers (PAE) with the subscriber anonymity. Simultaneously, here we argue that the proposed scheme can also withstand several other security vulnerabilities like redirection attack, forging-mobile-user attack and location privacy etc. with the less communication cost.

Original languageEnglish
Title of host publicationICICS 2013 - Conference Guide of the 9th International Conference on Information, Communications and Signal Processing
PublisherIEEE Computer Society
DOIs
Publication statusPublished - 2013
Event9th International Conference on Information, Communications and Signal Processing, ICICS 2013 - Tainan, Taiwan
Duration: 2013 Dec 102013 Dec 13

Other

Other9th International Conference on Information, Communications and Signal Processing, ICICS 2013
CountryTaiwan
CityTainan
Period13-12-1013-12-13

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Signal Processing

Fingerprint Dive into the research topics of 'Provably secure mutual authentication and key agreement scheme with user anonymity'. Together they form a unique fingerprint.

Cite this