An authentication protocol offering service anonymity of mobile device in ubiquitous environment

被引:6
|
作者
Park, Jong Hyuk
机构
[1] Seoul National University of Science and Technology, 172, Gongreung 2-dong, Nowon-gu
关键词
Anonymity; Authentication; Mobile; Ubiquitous;
D O I
10.1007/s11227-010-0467-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of ubiquitous era, various devices and services using wireless network are increasing. For communications in wireless network, mobile devices are used and various services are increasingly provided through mobile devices. The AAA (Authentication, Authorization, and Accounting) that authorizes and manages the mobile devices is processing the standardization for various application services for the purpose of the standardization of authentication, authorization, and accounting to provide safety and reliability of various services and protocols of both wired and wireless network. However, even if AAA exists the development of network varies vulnerabilities and attack types, and accordingly the exposure of information appears as the biggest problem. Therefore, this study suggests the safe authentication method that protects against information exposure by guaranteeing anonymity of service with temporal ID, and provides efficiency because AAA authentication server is based on the ticket given to a service server without the need of re-authentication when mobile node authorized from the AAA authentication server receives service.
引用
收藏
页码:105 / 117
页数:13
相关论文
共 50 条
  • [1] An authentication protocol offering service anonymity of mobile device in ubiquitous environment
    Jong Hyuk Park
    The Journal of Supercomputing, 2012, 62 : 105 - 117
  • [2] Towards mobile ubiquitous service environment
    Ji, Yang
    Zhang, Ping
    Hu, Zheng
    Wang, Xu
    Li, Yinong
    Tang, Xiaosheng
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 38 (01) : 67 - 78
  • [3] Towards Mobile Ubiquitous Service Environment
    JI Yang
    Zhang Ping
    Hu Zheng
    Wang Xu
    Li Yinong
    Tang Xiaosheng
    Wireless Personal Communications, 2006, 38 : 67 - 78
  • [4] An improved authentication protocol for mobile agent device in RFID environment
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2012, 10 (05) : 508 - 520
  • [5] Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    Park, CS
    COMPUTER NETWORKS, 2004, 44 (02) : 267 - 273
  • [6] Provable secure authentication protocol with anonymity for roaming service in global mobility networks
    Zhou, Tao
    Xu, Jing
    COMPUTER NETWORKS, 2011, 55 (01) : 205 - 213
  • [7] A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
    Karuppiah, Marimuthu
    Kumari, Saru
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Basu, Sayantani
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4192 - 4209
  • [8] Multifactor Authentication Protocol in a Mobile Environment
    Maciej, Bartlomiejczyk
    Imed, El Fray
    Kurkowski, Miroslaw
    IEEE ACCESS, 2019, 7 : 157185 - 157199
  • [9] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325
  • [10] Office Device Authentication and Authorization Protocol in Ubiquitous Office Network
    Moon, Jong Sik
    Lee, Im-Yeong
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (07): : 2271 - 2291