Anonymous authentication protocol for multi-services in wireless environments

被引:0
作者
JIANG Nan WANG Jian College of Computer Science Beijing University of Technology Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China [1 ,2 ,3 ,1 ,100124 ,2 ,100044 ,3 ,100876 ]
机构
关键词
authentication; wireless networks; trusted domain; secret splitting; hash chain;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
引用
收藏
页码:69 / 74
页数:6
相关论文
共 50 条
[21]   PAPAR: Pairing Based Authentication Protocol with Anonymous Roaming for Wireless Mesh Networks [J].
Sultan, Nazatul Haque ;
Sarma, Nityananda .
2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, :155-160
[22]   A PUF-based anonymous authentication protocol for wireless medical sensor networks [J].
Xiaowei Shao ;
Yajun Guo ;
Yimin Guo .
Wireless Networks, 2022, 28 :3753-3770
[23]   How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security [J].
Chuang, Yun-Hsin ;
Lei, Chin-Laung ;
Shiu, Hung-, Jr. .
SYMMETRY-BASEL, 2021, 13 (09)
[24]   Anonymous authentication protocol for GSM networks [J].
Department of Computer Engineering, Sharif University of Technology, Tehran, Iran .
Int. J. Secur. Netw., 2008, 1 (54-62) :54-62
[25]   A User Anonymous Mutual Authentication Protocol [J].
Kumari, Saru ;
Li, Xiong ;
Wu, Fan ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Khan, Muhammad Khurram .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09) :4508-4528
[26]   Anonymous channel and authentication in wireless communications [J].
Juang, WS ;
Lei, CL ;
Chang, CY .
COMPUTER COMMUNICATIONS, 1999, 22 (15-16) :1502-1511
[27]   Anonymous authentication scheme for subscription services [J].
Fujii, Arisa ;
Ohtake, Go ;
Hanaoka, Goichiro ;
Ogawa, Kazuto .
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 :975-+
[28]   A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments [J].
R. Madhusudhan ;
R. Shashidhara .
Arabian Journal for Science and Engineering, 2020, 45 :2993-3014
[29]   A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments [J].
Madhusudhan, R. ;
Shashidhara, R. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) :2993-3014
[30]   A Lightweight Anonymous Authentication Protocol Using k-pseudonym Set in Wireless Networks [J].
Li Xinghua ;
Liu Hai ;
Wei Fushan ;
Ma Jianfeng ;
Yang Weidong .
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,