A Note on an Authentication Technique Based on Distributed Security Management for the Global Mobility Network

In this paper, we analyse the authentication protocol that has been proposed for the so-called global mobility network in the October 1997 issue of the IEEE Journal on Selected Areas in Communications. Using a simple logic of authentication, we show that the protocol has flaws and we present three different attacks that exploit these. We correct the protocol using a simple design tool that we have developed.


    • LSR-REPORT-1998-002

    Record created on 2005-07-13, modified on 2016-08-08

Related material