Anonymous authentication protocol for multi-services in wireless environments

被引:0
作者
JIANG Nan 1
机构
基金
中国国家自然科学基金;
关键词
authentication; wireless networks; trusted domain; secret splitting; hash chain;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
引用
收藏
页码:69 / 74
页数:6
相关论文
共 50 条
  • [21] An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network
    Zhang, Xin
    Wen, Fengtong
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 201 - 215
  • [22] How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security
    Chuang, Yun-Hsin
    Lei, Chin-Laung
    Shiu, Hung-, Jr.
    SYMMETRY-BASEL, 2021, 13 (09):
  • [23] Anonymous authentication protocol for GSM networks
    Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
    Int. J. Secur. Netw., 2008, 1 (54-62): : 54 - 62
  • [24] A User Anonymous Mutual Authentication Protocol
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Odelu, Vanga
    Khan, Muhammad Khurram
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4508 - 4528
  • [25] Anonymous channel and authentication in wireless communications
    Juang, WS
    Lei, CL
    Chang, CY
    COMPUTER COMMUNICATIONS, 1999, 22 (15-16) : 1502 - 1511
  • [26] Anonymous authentication scheme for subscription services
    Fujii, Arisa
    Ohtake, Go
    Hanaoka, Goichiro
    Ogawa, Kazuto
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 975 - +
  • [27] A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
    R. Madhusudhan
    R. Shashidhara
    Arabian Journal for Science and Engineering, 2020, 45 : 2993 - 3014
  • [28] A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
    Madhusudhan, R.
    Shashidhara, R.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2993 - 3014
  • [29] A Lightweight Anonymous Authentication Protocol Using k-pseudonym Set in Wireless Networks
    Li Xinghua
    Liu Hai
    Wei Fushan
    Ma Jianfeng
    Yang Weidong
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [30] Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
    Gope, Prosanta
    Lee, Jemin
    Quek, Tony Q. S.
    IEEE SENSORS JOURNAL, 2017, 17 (02) : 498 - 503