Security

Optimal Authentication Scheme for Mobile Communication System

Free registration required

Executive Summary

To meet the security specifications many of existing user authentication schemes requires huge computational cost. This Huge computational cost is because many of the authentication methods used exponential operations. But this approach is not suitable for mobile devices. In this paper, the authors propose a low computation cost user authentication scheme for mobile communication. Their scheme uses only one-way hash functions and smart cards and can be implemented efficiently. The proposed scheme addresses the weakness appeared in existing methods and is well suitable for mobile communications.

  • Format: PDF
  • Size: 182.04 KB