Enhanced Key Management for Wireless Communications

Download Now
Provided by: Binary Information Press
Topic: Security
Format: PDF
Recently, the researcher proposed a key management protocol to solve several drawbacks in wireless communication systems including: transmission overloading between Home Location Register (HLR) and Visited Location Register (VLR); storage overhead in VLR; calculation overloading when authenticating a mobile user. This paper indicates that their protocol has two weaknesses in that a malicious VLR can forge the authentication messages in session key establishment process, and a malicious mobile user can also forge the authentication messages in the same process.
Download Now

Find By Topic