期刊文献+

A Generic Framework for Anonymous Authentication in Mobile Networks

A Generic Framework for Anonymous Authentication in Mobile Networks
原文传递
导出
摘要 Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication, processing and storage capabilities. In this paper, we present ~ generic construction that converts any existing secure password authen- tication scheme based on a smart card into an anonymous authentication scheme for roaming services. The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions. Compared with the original password authentication scheme, the transformed scheme does not sacrifice the authentication efficiency, and additionally, an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited. Furthermore, we present an instantiation of the proposed generic construction. The performance analysis shows that compared with other related anonymous authentication schemes, our instantiation is more efficient. Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication, processing and storage capabilities. In this paper, we present ~ generic construction that converts any existing secure password authen- tication scheme based on a smart card into an anonymous authentication scheme for roaming services. The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions. Compared with the original password authentication scheme, the transformed scheme does not sacrifice the authentication efficiency, and additionally, an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited. Furthermore, we present an instantiation of the proposed generic construction. The performance analysis shows that compared with other related anonymous authentication schemes, our instantiation is more efficient.
作者 徐静 朱文涛
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第4期732-742,共11页 计算机科学技术学报(英文版)
基金 supported by the National Basic Research 973 Program of China under Grant No.2013CB338003 the National Natural Science Foundation of China under Grant Nos.61170279 and 61272479 the Strategic Priority Research Program of Chinese Academy of Sciences under Grant Nos.XDA06010701 and XDA06010702
关键词 wireless security roaming service user anonymity password authentication key agreement wireless security, roaming service, user anonymity, password authentication, key agreement
  • 相关文献

参考文献18

  • 1Suzukiz S, Nakada K. An authentication technique based on distributed security management for the global mobility net-work. IEEEJournal on Selected Areas in Communications, 1997, 15(8): 1608-1617.
  • 2Chen H, Xiao Y, Hong X, Hu F, XieJ L. A survey of anonymity in wireless communication systems. Security and Communication Networks, 2009, 2(5): 427-444.
  • 3Jiang Y, Lin C, Shen X, Shi M. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 2006, 5(9): 2569-2577.
  • 4ParkJ, GoJ, Kim K. Wireless authentication protocol pre-serving user anonymity. In Proc. Symposium on Cryptogra-phy and Information Security (SCIS2001),Jan. 2001, pp.159- 164.
  • 5Samfat D, Molva R, Asokan N. Untraceability in mobile net-works. In Proc. the 1st Annual International Conference on Mobile Computing and Networking (ACM MobiCom1995), Nov. 1995, pp.26-36.
  • 6Tang C, Wu D O. Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications, 2008, 7(3): 1035-1042.
  • 7Wan Z G, Ren K, Preneel B. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryp-tion for mobile networks. In Proc. the 1st ACM Conference on Wireless Network Security (WiSec 2008), March 31-April 2, 2008, pp.62-67.
  • 8Yang G, Wong D S, Deng X. Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 2007, 6(9): 3461-3472.
  • 9He D, Chan S, Chen C, BuJ, Fan R. Design and validation of an efficient authentication scheme with anonymity for roam-ing service in global mobility networks. Wireless Personal Communications, 2011, 61(2): 465-472.
  • 10Li C T, Lee C C. A novel user authentication and privacy preserving scheme with smart cards for wireless communica-tions. Mathematical and Computer Modelling, 2012, 55(1/2): 35-44.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部