A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks

被引:0
作者
Zhou, You-sheng [1 ,2 ]
Zhou, Jun-feng [1 ]
Wang, Feng [3 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Dezhou Univ, Coll Math Sci, Dezhou 253023, Peoples R China
关键词
roaming authentication; anonymous; chaotic maps; key agreement;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A privacy-preserving roaming authentication scheme (PPRAS) for ubiquitous networks is proposed, in which a remote mobile user can obtain the service offered by a foreign agent after being authenticated. In order to protect the mobile user's privacy, the user presents an anonymous identity to the foreign agent with the assistance of his or her home agent to complete the authentication. After that, the user and the foreign agent can establish a session key using the semi-group property of Chebyshev polynomial. In this way, huge burden of key management is avoided. Furthermore, the user can update the login password and the session key between itself and the foreign agent if necessary. The correctness is proved using BAN logic, and the performance comparison against the existing schemes is given as well.
引用
收藏
页码:463 / 471
页数:9
相关论文
共 27 条
[1]  
[Anonymous], 2013, P NETW DISTR SYST SE
[2]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[3]   A new digital signature scheme based on chaotic maps [J].
Chain, Kai ;
Kuo, Wen-Chung .
NONLINEAR DYNAMICS, 2013, 74 (04) :1003-1012
[4]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[5]   Lightweight and provably secure user authentication with anonymity for the global mobility network [J].
Chen, Chun ;
He, Daojing ;
Chan, Sammy ;
Bu, Jiajun ;
Gao, Yi ;
Fan, Rong .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) :347-362
[6]  
Chin-Chen Chang, 2009, Proceedings of the 2009 Ninth IEEE International Conference on Computer and Information Technology. CIT 2009, P131, DOI 10.1109/CIT.2009.45
[7]  
Daojing He, 2010, Proceedings of the 13th International Conference on Network-Based Information Systems (NBiS 2010), P305, DOI 10.1109/NBiS.2010.34
[8]  
Farash MS, 2015, INT J COMMUNICATION
[9]   Chaotic maps-based password-authenticated key agreement using smart cards [J].
Guo, Cheng ;
Chang, Chin-Chen .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (06) :1433-1440
[10]   A strong user authentication scheme with smart cards for wireless communications [J].
He, Daojing ;
Ma, Maode ;
Zhang, Yan ;
Chen, Chun ;
Bu, Jiajun .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :367-374