Anonymous authentication protocol for multi-services in wireless environments

被引:0
作者
JIANG Nan WANG Jian College of Computer Science Beijing University of Technology Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China [1 ,2 ,3 ,1 ,100124 ,2 ,100044 ,3 ,100876 ]
机构
关键词
authentication; wireless networks; trusted domain; secret splitting; hash chain;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
引用
收藏
页码:69 / 74
页数:6
相关论文
共 50 条
[41]   A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services [J].
Lyu, Qiuyun ;
Li, Hao ;
Deng, Zhining ;
Wang, Jingyu ;
Ren, Yizhi ;
Zheng, Ning ;
Liu, Junliang ;
Liu, Huaping ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) :2546-2561
[42]   Multi-device anonymous authentication [J].
Kamil Kluczniak ;
Jianfeng Wang ;
Xiaofeng Chen ;
Mirosław Kutyłowski .
International Journal of Information Security, 2019, 18 :181-197
[43]   Multi-device anonymous authentication [J].
Kluczniak, Kamil ;
Wang, Jianfeng ;
Chen, Xiaofeng ;
Kutylowski, Miroslaw .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (02) :181-197
[44]   An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks [J].
Li, Wenmin ;
Wen, Qiaoyan ;
Su, Qi ;
Jin, Zhengping ;
Wang, Yanjiong .
AD HOC & SENSOR WIRELESS NETWORKS, 2012, 16 (1-3) :29-44
[45]   An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications [J].
Rui Chen ;
Dezhong Peng .
Wireless Personal Communications, 2017, 97 :2665-2682
[46]   An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications [J].
Park, Youngho ;
Sur, Chul ;
Jung, Chae Duk ;
Rhee, Kyung-Hyune .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (03) :785-800
[47]   Efficient Anonymous Authentication for Wireless Body Area Networks [J].
Li, Chuang ;
Xu, Chunxiang .
IEEE ACCESS, 2022, 10 :80015-80026
[48]   Anonymous wireless authentication on a portable cellular mobile system [J].
Wang, SJ .
IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (10) :1317-1329
[49]   An Anonymous Authentication Scheme with the Enhanced Security for Wireless Communications [J].
Chen, Rui ;
Peng, Dezhong .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) :2665-2682
[50]   Anonymous Authentication for Wireless Access in Internet from Pairings [J].
Wu, Shyi-Tsong ;
Chiu, Jung-Hui ;
Chieu, Bin-Chang .
JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (01) :59-64