An authentication protocol offering service anonymity of mobile device in ubiquitous environment

被引:6
|
作者
Park, Jong Hyuk
机构
[1] Seoul National University of Science and Technology, 172, Gongreung 2-dong, Nowon-gu
关键词
Anonymity; Authentication; Mobile; Ubiquitous;
D O I
10.1007/s11227-010-0467-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of ubiquitous era, various devices and services using wireless network are increasing. For communications in wireless network, mobile devices are used and various services are increasingly provided through mobile devices. The AAA (Authentication, Authorization, and Accounting) that authorizes and manages the mobile devices is processing the standardization for various application services for the purpose of the standardization of authentication, authorization, and accounting to provide safety and reliability of various services and protocols of both wired and wireless network. However, even if AAA exists the development of network varies vulnerabilities and attack types, and accordingly the exposure of information appears as the biggest problem. Therefore, this study suggests the safe authentication method that protects against information exposure by guaranteeing anonymity of service with temporal ID, and provides efficiency because AAA authentication server is based on the ticket given to a service server without the need of re-authentication when mobile node authorized from the AAA authentication server receives service.
引用
收藏
页码:105 / 117
页数:13
相关论文
共 50 条
  • [11] Efficient authentication protocol with anonymity and key protection for mobile Internet users
    Jiang, Yan
    Zhu, Youwen
    Wang, Jian
    Xiang, Yong
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 : 179 - 191
  • [12] A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity
    Chain, Kai
    Kuo, Wen-Chung
    Cheng, Jiin-Chiou
    APPLIED SCIENCES-BASEL, 2016, 6 (12):
  • [13] An anonymity-preserving mobile user authentication protocol for global roaming services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    COMPUTER NETWORKS, 2023, 221
  • [14] User authentication scheme preserving anonymity for ubiquitous devices
    Djellali, Benchaa
    Belarbi, Kheira
    Chouarfia, Abdallah
    Lorenz, Pascal
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3131 - 3141
  • [15] User Authentication Protocol Based on the Location Factor for a Mobile Environment
    Bartlomiejczyk, Maciej
    El Fray, Imed
    Kurkowski, Miroslaw
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    IEEE ACCESS, 2022, 10 : 16439 - 16455
  • [16] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [17] A Robust User Authentication Protocol with Anonymity, Deniability, Key Agreement and Efficiency
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 127 - 132
  • [18] An efficient authentication protocol with anonymity for 3G/WLAN interworking
    Chien, Hung-Yu
    Teng, Hung-Yi
    Chen, Yen-Cheng
    JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (01): : 15 - 24
  • [19] Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Wen-lu Zeng
    Wireless Personal Communications, 2013, 70 : 1473 - 1485
  • [20] Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Zeng, Wen-lu
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1473 - 1485