Title
On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
Abstract
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile user and the accessed VLR. Fortunately, we improve its security in this paper.
Year
DOI
Venue
2010
10.1109/WICOM.2010.5601341
IACR Cryptology ePrint Archive
Keywords
Field
DocType
mobile authentication scheme,communication key,mobile user,wireless network security,replication attack,radio networks,mobile radio,authorisation,telecommunication security,denial-of-service attack,mobile networks attacks,authentication,denial of service attack,mobile computing,protocols,wireless networks,it security,mobile communication,mobile network,wireless network
Mobile computing,Mobile authentication,Mobile radio,Wireless network,Authentication,Denial-of-service attack,Computer security,Computer science,Authorization,Computer network,Mobile telephony
Journal
Volume
Issue
ISBN
2010
null
978-1-4244-3709-2
Citations 
PageRank 
References 
10
0.67
5
Authors
2
Name
Order
Citations
PageRank
Jian-zhu Lu1383.88
Jipeng Zhou213115.12