Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers

Research Article

Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications

Download
476 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29154-8_19,
        author={Abdullah Almuhaideb and Phu Le and Bala Srinivasan},
        title={Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2012},
        month={10},
        keywords={authentication ubiquitous mobile access security protocols roaming agreement wireless roaming},
        doi={10.1007/978-3-642-29154-8_19}
    }
    
  • Abdullah Almuhaideb
    Phu Le
    Bala Srinivasan
    Year: 2012
    Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-642-29154-8_19
Abdullah Almuhaideb1,*, Phu Le1,*, Bala Srinivasan1,*
  • 1: Monash University
*Contact email: Abdullah.Almuhaideb@monash.edu.au, Phu.Dung.Le@monash.edu.au, Srini@monash.edu.au

Abstract

Ubiquitous connectivity faces interoperation issues between wireless network providers when authenticating visiting users. This challenge lies in the fact that a foreign network provider does not initially have the authentication credentials of the mobile users. The existing approaches are based on roaming agreement to exchange authentication information between the home network and a foreign network. This paper proposes Passport/Visa approach that consists of two tokens: Passport (authentication token) and Visa (authorisation token), to provide a flexible authentication method for foreign networks to authenticate mobile users. Our approach can be used when there is no roaming agreement between foreign networks and the mobile user’s home network. The security analysis indicates that our protocol is resistant to well-known attacks, ant it efficiently ensures the security for both mobile users and network providers. The performance analysis also demonstrated that the proposed protocol will greatly enhance computation, and communication cost.