Skip to main navigation Skip to search Skip to main content

An efficient authentication protocol supporting privacy in mobile computing environments

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The anticipated increase in mobility and popular use of mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol that provides mobile hosts with the functionalities of authentication and session key distribution for user privacy and secure communication. Considering mobile computing environments, our protocol has design principles such as reducing computation and communication overhead of mobile hosts, and uses random numbers, time-stamps, and authentication codes in order to protect systems from attacks by eavesdroppers. While our protocol supports authentication, secure communication, anonymity, and untraceability for mobile hosts, it can be an efficient authentication protocol for mobile computing environments.

Original languageEnglish
Title of host publication5th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC 2002
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages332-334
Number of pages3
ISBN (Electronic)0780376005, 9780780376007
DOIs
StatePublished - 2002
Event5th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC 2002 - Jeju Island, Korea, Republic of
Duration: 3 Jul 20025 Jul 2002

Publication series

Name5th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC 2002

Conference

Conference5th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC 2002
Country/TerritoryKorea, Republic of
CityJeju Island
Period3/07/025/07/02

Fingerprint

Dive into the research topics of 'An efficient authentication protocol supporting privacy in mobile computing environments'. Together they form a unique fingerprint.

Cite this