A Note on an Authentication Technique Based on Distributed Security Management for the Global Mobility Network

In this paper, we analyse the authentication protocol that has been proposed for the so-called global mobility network in the October 1997 issue of the IEEE Journal on Selected Areas in Communications. Using a simple logic of authentication, we show that the protocol has flaws and we present three different attacks that exploit these. We correct the protocol using a simple design tool that we have developed.


Year:
1998
Keywords:
Laboratories:




 Record created 2005-07-13, last modified 2018-03-18

n/a:
IC_TECH_REPORT_199818 - Download fulltextPDF
BCS98 - Download fulltextPS
TR98_018 - Download fulltextPS
Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)