A formal analysis of authentication protocols for mobile devices in next generation networks
- Submitting institution
-
Middlesex University
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 1356
- Type
- D - Journal article
- DOI
-
10.1002/cpe.3260
- Title of journal
- Concurrency and Computation: Practice and Experience
- Article number
- -
- First page
- 2938
- Volume
- 27
- Issue
- 12
- ISSN
- 1532-0626
- Open access status
- Out of scope for open access requirements
- Month of publication
- March
- Year of publication
- 2014
- URL
-
http://eprints.mdx.ac.uk/14018/
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
0
- Research group(s)
-
-
- Citation count
- 1
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- Mobile devices store sensitive data and represent end-users to network operators as well as service providers. It is crucial, for end-users to trust their mobile devices, hence the large number of proposed protocols to build this trust. The paper is significant because firstly, it formally analyses a number of device-level authentication protocols proposed in the literature, and highlights new attacks against them. Secondly, it proposes two new, light-weight authentication and key agreement protocols that are formally verified and proven to meet all desired security requirements for authentication protocols.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -