Key Exchange Protocol for Mobile Authentication
In this paper, the authors present an overview of four protocols based on mutual authentication and key exchange. Each of the protocol has their own way of exchanging session keys and authenticating the users. Later they present the differences and similarities between all the four protocols and conclusion based on their comparisons. One of the most serious security threats to any computing device is impersonation of an authorized user. User authentication is the first line of defense against this threat. The wireless communication medium is more difficult to be protected against active attacks and eavesdropping. Intention of each protocol is to securely exchange session keys for making future transmission secured by encrypting messages with the session key.