A new end-to-end authentication protocol for mobile users to access internet services

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

When a mobile user using wireless devices tries to access to a Service Provider (SP) connected to wire-lined network such as the Internet, security risks experienced by SP as well as the wireless and wire-lined network providers are greater. The mobility and resource-limited nature exhibited by the wireless devices only make the security provision in such a context ever challenging. This paper attempts to set a step forward toward finding an asymmetrical approach to the provision of security to mobile users by re-examining the issue of end-to-end authentication. Having first examined the special security and performance requirements in this application context, the paper surveys the related work in the subject area, and then presents a new network-assisted endtoend authentication and key exchange protocol suited to mobile users in their access to Internet services.

Cite

CITATION STYLE

APA

He, L. S., Zhang, N., & He, L. R. (2002). A new end-to-end authentication protocol for mobile users to access internet services. In IFIP Advances in Information and Communication Technology (Vol. 86, pp. 239–250). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-0-387-35586-3_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free