By Topic

Dynamic authentication protocol for personal communication system (PCS)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Zheng Zhibin ; Commun. Res. Center, Harbin Inst. of Technol., China ; Zhang Naitong

The security problem in personal communication systems is a crucial technique for the development of PCS. This paper proposes a dynamic secure protocol suitable for PCS, which is based on the public-key and secret-key hybrid algorithm timestamp and a small storage variable which embodies the dynamic character. The protocol overcomes the threatening problem of clone attack that cannot be resisted in Brown (1995), and remedies for the existing pity in Yu and Harn (1995) and Liu Jianwei and Wang Yumin (1998) in which the maximum times of calling have been limited. In addition, the implementation of the protocol becomes more convenient. The paper analyses the characteristics of this protocol and discusses that the protocol can effectively resist the relay-type clone attack which many secure schemes cannot conquer. Finally, we conclude that the protocol has very good security

Published in:

Communication Technology Proceedings, 1998. ICCT '98. 1998 International Conference on

Date of Conference:

22-24 Oct 1998