Enhancing an AAA scheme using ID-based tickets with anonymity in future mobile communication

Chin Ling Chen, Kai Wen Cheng, Chih Cheng Chen, Ing-Chau Chang

Research output: Contribution to journalArticle

Abstract

In 2011, Moon and Lee proposed an AAA scheme using ID-based tickets with anonymity in future mobile communication in order to provide a ubiquitous communication environment. However, there are some security loopholes that need to be addressed. When malicious attackers steal a mobile device, they can utilize the mobile's information to access resources or request services. We therefore propose a novel scheme to improve mobile communication protocol to ensure communication security. The proposed scheme achieves low computation, and resists known attacks. The mobile user need not worry about his or her sensitive information being revealed or stolen by malicious attackers.

Original languageEnglish
Pages (from-to)107-116
Number of pages10
JournalApplied Mathematics and Information Sciences
Volume8
Issue number1 L
DOIs
Publication statusPublished - 2014 Jan 1

Fingerprint

Identity-based
Mobile Communication
Anonymity
Communication
Moon
Mobile devices
Communication Protocol
Network protocols
Resist
Mobile Devices
Attack
Resources
Secure communication

All Science Journal Classification (ASJC) codes

  • Analysis
  • Numerical Analysis
  • Computer Science Applications
  • Computational Theory and Mathematics
  • Applied Mathematics

Cite this

@article{6fab74861e7a4b229d56a1c206ace958,
title = "Enhancing an AAA scheme using ID-based tickets with anonymity in future mobile communication",
abstract = "In 2011, Moon and Lee proposed an AAA scheme using ID-based tickets with anonymity in future mobile communication in order to provide a ubiquitous communication environment. However, there are some security loopholes that need to be addressed. When malicious attackers steal a mobile device, they can utilize the mobile's information to access resources or request services. We therefore propose a novel scheme to improve mobile communication protocol to ensure communication security. The proposed scheme achieves low computation, and resists known attacks. The mobile user need not worry about his or her sensitive information being revealed or stolen by malicious attackers.",
author = "Chen, {Chin Ling} and Cheng, {Kai Wen} and Chen, {Chih Cheng} and Ing-Chau Chang",
year = "2014",
month = "1",
day = "1",
doi = "10.12785/amis/081L14",
language = "English",
volume = "8",
pages = "107--116",
journal = "Applied Mathematics and Information Sciences",
issn = "1935-0090",
publisher = "Natural Sciences Publishing Corporation",
number = "1 L",

}

Enhancing an AAA scheme using ID-based tickets with anonymity in future mobile communication. / Chen, Chin Ling; Cheng, Kai Wen; Chen, Chih Cheng; Chang, Ing-Chau.

In: Applied Mathematics and Information Sciences, Vol. 8, No. 1 L, 01.01.2014, p. 107-116.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Enhancing an AAA scheme using ID-based tickets with anonymity in future mobile communication

AU - Chen, Chin Ling

AU - Cheng, Kai Wen

AU - Chen, Chih Cheng

AU - Chang, Ing-Chau

PY - 2014/1/1

Y1 - 2014/1/1

N2 - In 2011, Moon and Lee proposed an AAA scheme using ID-based tickets with anonymity in future mobile communication in order to provide a ubiquitous communication environment. However, there are some security loopholes that need to be addressed. When malicious attackers steal a mobile device, they can utilize the mobile's information to access resources or request services. We therefore propose a novel scheme to improve mobile communication protocol to ensure communication security. The proposed scheme achieves low computation, and resists known attacks. The mobile user need not worry about his or her sensitive information being revealed or stolen by malicious attackers.

AB - In 2011, Moon and Lee proposed an AAA scheme using ID-based tickets with anonymity in future mobile communication in order to provide a ubiquitous communication environment. However, there are some security loopholes that need to be addressed. When malicious attackers steal a mobile device, they can utilize the mobile's information to access resources or request services. We therefore propose a novel scheme to improve mobile communication protocol to ensure communication security. The proposed scheme achieves low computation, and resists known attacks. The mobile user need not worry about his or her sensitive information being revealed or stolen by malicious attackers.

UR - http://www.scopus.com/inward/record.url?scp=84896824942&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84896824942&partnerID=8YFLogxK

U2 - 10.12785/amis/081L14

DO - 10.12785/amis/081L14

M3 - Article

AN - SCOPUS:84896824942

VL - 8

SP - 107

EP - 116

JO - Applied Mathematics and Information Sciences

JF - Applied Mathematics and Information Sciences

SN - 1935-0090

IS - 1 L

ER -