Abstract | ||
---|---|---|
Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the scheme can effectively defend all known attacks to mobile networks including the denial-of-service attack. This article shows an existential replication attack on the scheme and, as a result, an attacker can obtain the communication key between a mobile user and the accessed VLR. Fortunately, we improve its security in this paper. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/WICOM.2010.5601341 | IACR Cryptology ePrint Archive |
Keywords | Field | DocType |
mobile authentication scheme,communication key,mobile user,wireless network security,replication attack,radio networks,mobile radio,authorisation,telecommunication security,denial-of-service attack,mobile networks attacks,authentication,denial of service attack,mobile computing,protocols,wireless networks,it security,mobile communication,mobile network,wireless network | Mobile computing,Mobile authentication,Mobile radio,Wireless network,Authentication,Denial-of-service attack,Computer security,Computer science,Authorization,Computer network,Mobile telephony | Journal |
Volume | Issue | ISBN |
2010 | null | 978-1-4244-3709-2 |
Citations | PageRank | References |
10 | 0.67 | 5 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jian-zhu Lu | 1 | 38 | 3.88 |
Jipeng Zhou | 2 | 131 | 15.12 |