Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks

被引:0
作者
Wei, Li [1 ]
Yao, Yongtao [1 ]
Ding, Zhijun [1 ]
Pu, Qiong [1 ]
机构
[1] Tongji Univ, Sch Elect & Informat Engn, Shanghai 201804, Peoples R China
关键词
Roaming service; authentication; unlinkability; anonymity; user mobility; KEY EXCHANGE PROTOCOLS; MUTUAL AUTHENTICATION; AGREEMENT; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most recently, Chang and Tsai proposed an anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks. In this paper, we point out their scheme cannot provide user unlinkability, which is important to protect user privacy. Moreover, we find that if the delegation key of a mobile user is compromised, the identity of the user cannot be used any more. In addition, we also find it is not practical enough due to high computational cost involved. Thereafter, we propose a novel lightweight authentication scheme with anonymity and unlinkability for roaming service in large-scale wireless networks to overcome the foresaid defects. Moreover, we formally analyze our proposed scheme with the BAN-logic and show that it can withstand the several possible attacks.
引用
收藏
页码:313 / 339
页数:27
相关论文
共 30 条
  • [1] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [2] [Anonymous], 2003, 33102 3GPP TS TSG
  • [3] [Anonymous], P 3 IEEE INT C MOB A
  • [4] Performance analysis of cryptographic protocols on handheld devices
    Argyroudis, PG
    Verma, R
    Tewari, H
    O'Mahony, D
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 169 - 174
  • [5] ATENIESE G, 1994, P IEEE WORKSH MOB SY
  • [6] PRIVACY AND AUTHENTICATION ON A PORTABLE COMMUNICATIONS-SYSTEM
    BELLER, MJ
    CHANG, LF
    YACOBI, Y
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (06) : 821 - 829
  • [7] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [8] Canard S., 2008, P RFIDSEC 08
  • [9] An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) : 3346 - 3353
  • [10] Lightweight and provably secure user authentication with anonymity for the global mobility network
    Chen, Chun
    He, Daojing
    Chan, Sammy
    Bu, Jiajun
    Gao, Yi
    Fan, Rong
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) : 347 - 362