International Journal of Network Security
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove the users identity via a secret shared key. However, this implies that the server requires secure storage and organization of a bulky database for the shared keys of all users. Evidently, such a sensitive and large database increases both maintenance loading and security concerns due to malicious intruders. In this paper, a self-concealing mechanism was invented which allows to discard the bulky database and create valuable improvements for portable communication systems.