14Privacy and Authentication on Security Protocol for Mobile Communications

Brajesh Kumar Gupta “Mewadev”

Eklavya P. G. College, Banda, Bundelkhand University, Jhansi, U.P., India


For effective speaker identity authentication, a new protocol is proposed, the nature of mobile communication, characterized for example by terminals having good user interface and limited processing capacity concerned with the design of authentication protocols for a mobile computing environment. Communication security is often described in terms of confidentiality, integrity, authentication and non-repudiation of transmitted data and these protocols enable mutual authentication and establish a shared secret key between mobile users. On the other hand, a good identity authentication the system can guarantee that no unauthorized user fraudulently gets the required services from the home system, therefore, future systems will be characterized by a horizontal communication model. Authentication mechanisms may vary depending on the security technologies and policies used by different networks, based on pointer forwarding to reduce the HLR update cost and traffic load for the MS authentication protocol. Currently, there are no structured mobility management schemes for these heterogeneous multi‐hop networks, if handover happens during an active session of service, especially between different networks, various issues arise such as how to maintain the integrity and consistency of accounting records, ...

Get Design and Analysis of Security Protocol for Communication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.