Anonymous authentication protocol for multi-services in wireless environments

被引:0
作者
JIANG Nan 1
机构
基金
中国国家自然科学基金;
关键词
authentication; wireless networks; trusted domain; secret splitting; hash chain;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
引用
收藏
页码:69 / 74
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis and Design of Anonymous Authentication Protocol for Value-Added Services in Internet of Vehicles
    Yao H.
    Yan Q.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (02): : 440 - 451
  • [32] A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Wu, Fan
    Sangaiah, Arun Kumar
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 : 194 - 204
  • [33] AnonPri: An Efficient Anonymous Private Authentication Protocol
    Hoque, Md. Endadul
    Rahman, Farzana
    Ahamed, Sheikh Iqbal
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2011), 2011, : 102 - 110
  • [34] A Practical Authentication Protocol for Anonymous Web Browsing
    Yang, Xu
    Yi, Xun
    Cui, Hui
    Yang, Xuechao
    Nepal, Surya
    Huang, Xinyi
    Zeng, Yali
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 468 - 482
  • [35] A Robust and Efficient Anonymous Authentication Protocol in VANETs
    Jung, Chae Duk
    Sur, Chul
    Park, Youngho
    Rhee, Kyung-Hyune
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2009, 11 (06) : 607 - 614
  • [36] Universal Authentication Protocols for Anonymous Wireless Communications
    Yang, Guomin
    Huang, Qiong
    Wong, Duncan S.
    Deng, Xiaotie
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (01) : 168 - 174
  • [37] Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check
    Gupta, Mohit
    Chaudhari, Narendra S.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) : 4491 - 4501
  • [38] Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check
    Mohit Gupta
    Narendra S. Chaudhari
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4491 - 4501
  • [39] A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks
    Lee, JoonYoung
    Oh, Jihyeon
    Park, Youngho
    [J]. ELECTRONICS, 2023, 12 (06)
  • [40] A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services
    Lyu, Qiuyun
    Li, Hao
    Deng, Zhining
    Wang, Jingyu
    Ren, Yizhi
    Zheng, Ning
    Liu, Junliang
    Liu, Huaping
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2546 - 2561