Comments on an optimized protocol for mobile network authentication and security.
Keith M. MartinChris J. MitchellPublished in: ACM SIGMOBILE Mob. Comput. Commun. Rev. (1999)
Keyphrases
- mobile networks
- authentication protocol
- security analysis
- key agreement protocol
- mutual authentication
- ban logic
- virtual private network
- key distribution
- key agreement
- security protocols
- cryptographic protocols
- user authentication
- smart card
- key management
- ad hoc networks
- security mechanisms
- mobile users
- security services
- trusted third party
- security requirements
- mobile nodes
- wireless networks
- trust negotiation
- security properties
- base station
- mobile devices
- rfid tags
- private key
- ip networks
- secret key
- public key
- diffie hellman
- mobile ip
- cellular networks
- elliptic curve
- key exchange protocol
- access control
- network access
- provably secure
- intrusion detection
- security issues
- routing problem