Advanced Search
Volume 33 Issue 1
Feb.  2011
Turn off MathJax
Article Contents
Fu Jian-Qing, Chen Jian, Fan Rong, Chen Xiao-Ping, Ping Ling-Di. A Delegation-based Protocol for Anonymous Roaming Authentication in Mobile Communication Network[J]. Journal of Electronics & Information Technology, 2011, 33(1): 156-162. doi: 10.3724/SP.J.1146.2009.01455
Citation: Fu Jian-Qing, Chen Jian, Fan Rong, Chen Xiao-Ping, Ping Ling-Di. A Delegation-based Protocol for Anonymous Roaming Authentication in Mobile Communication Network[J]. Journal of Electronics & Information Technology, 2011, 33(1): 156-162. doi: 10.3724/SP.J.1146.2009.01455

A Delegation-based Protocol for Anonymous Roaming Authentication in Mobile Communication Network

doi: 10.3724/SP.J.1146.2009.01455 cstr: 32379.14.SP.J.1146.2009.01455
  • Received Date: 2009-11-11
  • Rev Recd Date: 2010-10-15
  • Publish Date: 2011-01-19
  • With the widespread use of mobile devices, issues like roaming authentication and identification privacy become increasingly prominent. This paper analyses the shortcomings of existing protocols of roaming authentication in term of anonymity and security that these protocols can not guarantee at the same time anonymity of mobile terminals and the filtration of illegal request. Based on elliptic-curve cryptography and proxy signature, a new anonymous protocol that allows a pair of proxy signature keys to be shared among some mobile devices randomly is proposed. Through analysis and verification using AVISPA, it shows that the new protocol realizes anonymity, the filtration of illegal request, mutual authentication and secure distribution of session key. It not only improves the security, but also reduces the computational load, which makes it more suitable for mobile devices with limited power.
  • loading
  • Kesdogan D and Palmer C. Technical challenges of network anonymity[J].Computer Communications.2006, 29(3):306-324[2][2] 3GPP TS 33.102 V8.1.0. Policy and charging control architecture[S]. Release 8, 2008-12.[3]Wu Chia-chun and Lee Wei-bin, et al.. A secure authentication scheme with anonymity for wireless communications[J].IEEE Communications Letters.2008, 12 (10):722-723[4]朱建明, 马建峰. 一种高效的具有用户匿名性的无线认证协议[J]. 通信学报, 2004, 25(6): 12-l8.[5]Zhu Jian-ming and Ma Jian-feng. An efficient authentication protocol with anonymity for wireless IP networks[J]. Journal of China Institute of Communication, 2004, 259(6): 12-18.[6]Zhu Jian-ming and Ma Jian-feng. A new authentication scheme with anonymity for wireless environment[J].IEEE Transactions on Consumer Electronic.2004, 50(1):231-235[7]Lee J S and Chang J H. Security flaw of authentication scheme with anonymity for wireless communications[J].IEEE Communications Letters.2009, 13(5):292-293[8]Wong D S. Security analysis of two anonymous authentication protocols for distributed wireless networks[C]. Third IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, Hawaii, USA, 2005: 284-288.[9]Zeng Peng and Cao Zhen-fu, et al.. On the anonymity of some authentication schemes for wireless communications[J].IEEE Communications Letters.2009, 13(3):170-171[10]Wei Yong-zhuang and Qiu Hong-bing, et al.. Security analysis of authentication scheme with anonymity for wireless environments [C]. International Conference on Communication Technology, Guilin, China, 2006: 1-4.[11]He Q, Wu D, and Khosla P. The Quest for personal control over mobile location privacy[J].IEEE Communications Magazine.2004, 42(5):130-136[12]Molva R, Samfat D, and Tsudik G. Authentication of mobile users[J]. IEEE Network, Special Issue on Mobile Communications, 1994, 8(2): 26-34.[13]Neuman B C and TSO T. Kerberos: an authentication service for computer networks[J].IEEE Communications Magazine.1994, 32(9):33-38[14]彭华熹, 冯登国. 匿名无线认证协议的匿名性缺陷和改进[J]. 通信学报, 2006, 27(9): 78-85.Peng Hua-xi and Feng Deng-guo. An efficient authentication protocol with anonymity for wireless IP networks [J]. Journal of China institute of Communication, 2006, 27(9): 78-85.[15]Lee Wei-bin and Chang-Kuo Y. A new delegation-based authentication protocol for use in portable communication systems[J].IEEE Transactions on Wireless Communications.2005, 4(1):57-64[16]Tang Cai-mu and Wu D O. An efficient mobile authentication scheme for wireless networks[J].IEEE Transactions on Wireless Communications.2008, 7(4):1408-1416[17]Tang Cai-mu and Wu D O. Mobile Privacy in Wireless Networks-Revisited[J].IEEE Transactions on Wireless Communications.2008, 7(3):1035-1042[18]Fu Jian-qing, Chen Jian, and Fan Rong, et al.. An efficient delegation-based anonymous authentication protocol[C]. Second International Workshop on Computer Science and Engineering, Qingdao, China, 2009, 1: 558-562.[19]Johnson D, Menezes A, and Vanstone S. The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1): 36-63.[20]Ateniese G, Herzberg A, and Krawczyk H, et al.. Untraceable mobility or how to travel incognito[J].Computer Networks.1999, 31(8):785-899[21]Bozga L, Lakhnech Y, and Perin M. Hermes: An automatic tool for the verification of secrecy in security protocols[C]. 15th International Conference on Computer Aided Verification, Colorado, USA, 2003, 2725: 219-222.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3808) PDF downloads(1432) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return