Robust and efficient authenticated key agreement in mobile communications
by Wen-Shenq Juang, Jing-Lin Wu
International Journal of Mobile Communications (IJMC), Vol. 7, No. 5, 2009

Abstract: Nowadays, the Global System for Mobile (GSM) communications is used widely by people around the world. However, there are some problems of GSM authentication to be found. In 2004, Choi and Kim proposed an authentication and key agreement scheme with user privacy protection in GSM. They claimed that their scheme can improve some drawbacks of GSM authentication and achieve user privacy protection. But we find that Choi and Kim's (2004) scheme is not able to achieve privacy protection and resist some well-known attacks completely. In this paper, we propose a more efficient GSM authentication and key agreement protocol with robust identity privacy protection.

Online publication date: Thu, 02-Apr-2009

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Mobile Communications (IJMC):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com