Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks
Wu S., Zhu Y., Pu Q. International Journal of Network Management21 (5):384-401,2011.Type:Article
Date Reviewed: Aug 23 2012

There has been tremendous growth in low-power mobile wireless network devices in recent years. With that growth has come the need for a secure roaming authentication scheme for these devices, so that mobile users can seamlessly and securely access services.

Wu et al. review two earlier schemes for mobile authentication and discuss the problems with them, before moving on to explain their proposed alternative. They introduce the main issues associated with authentication for mobile devices, security and anonymity, and describe each of the two earlier schemes in more detail. The main problem, they contend, is that these earlier schemes impose a high computational processing load on the mobile device, making implementation of the scheme impractical.

The authors describe their alternative in detail and claim that the efficiency of their lightweight authentication scheme makes it a practical solution that still maintains security and anonymity. A simple table near the end of the paper neatly compares various attributes of the authors’ solution to the alternatives. A good list of references is included. While the theory included in the paper supports the assertions, it will be interesting to see if any of these schemes are actually accepted for implementation by manufacturers.

I recommend this interesting paper on a rapidly growing and important area in our increasingly mobile world.

Reviewer:  David B. Henderson Review #: CR140543 (1302-0161)
Bookmark and Share
  Featured Reviewer  
 
Authentication (K.6.5 ... )
 
 
Data Communications (C.2.0 ... )
 
 
Wireless Communication (C.2.1 ... )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Cyberpunk
Hafner K., Markoff J., Simon & Schuster, Inc., New York, NY, 1991. Type: Book (9780671778798)
Nov 1 1993
How to sign digital streams
Gennaro R., Rohatgi P. Information and Computation 165(1): 100-116, 2001. Type: Article
Dec 1 2001
Signature schemes based on the strong RSA assumption
Cramer R., Shoup V. ACM Transactions on Information and System Security 3(3): 161-185, 2000. Type: Article
Mar 1 2001
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy