TY - GEN
T1 - An efficient authentication protocol supporting privacy in mobile computing environments
AU - Park, Sang Yun
AU - Han, Moon Seog
AU - Eom, Young Ik
N1 - Publisher Copyright:
© 2002 IEEE.
PY - 2002
Y1 - 2002
N2 - The anticipated increase in mobility and popular use of mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol that provides mobile hosts with the functionalities of authentication and session key distribution for user privacy and secure communication. Considering mobile computing environments, our protocol has design principles such as reducing computation and communication overhead of mobile hosts, and uses random numbers, time-stamps, and authentication codes in order to protect systems from attacks by eavesdroppers. While our protocol supports authentication, secure communication, anonymity, and untraceability for mobile hosts, it can be an efficient authentication protocol for mobile computing environments.
AB - The anticipated increase in mobility and popular use of mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol that provides mobile hosts with the functionalities of authentication and session key distribution for user privacy and secure communication. Considering mobile computing environments, our protocol has design principles such as reducing computation and communication overhead of mobile hosts, and uses random numbers, time-stamps, and authentication codes in order to protect systems from attacks by eavesdroppers. While our protocol supports authentication, secure communication, anonymity, and untraceability for mobile hosts, it can be an efficient authentication protocol for mobile computing environments.
UR - https://www.scopus.com/pages/publications/84964301200
U2 - 10.1109/HSNMC.2002.1032602
DO - 10.1109/HSNMC.2002.1032602
M3 - Conference contribution
AN - SCOPUS:84964301200
T3 - 5th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC 2002
SP - 332
EP - 334
BT - 5th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC 2002
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 5th IEEE International Conference on High Speed Networks and Multimedia Communications, HSNMC 2002
Y2 - 3 July 2002 through 5 July 2002
ER -