An authentication protocol offering service anonymity of mobile device in ubiquitous environment

被引:6
|
作者
Park, Jong Hyuk
机构
[1] Seoul National University of Science and Technology, 172, Gongreung 2-dong, Nowon-gu
关键词
Anonymity; Authentication; Mobile; Ubiquitous;
D O I
10.1007/s11227-010-0467-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of ubiquitous era, various devices and services using wireless network are increasing. For communications in wireless network, mobile devices are used and various services are increasingly provided through mobile devices. The AAA (Authentication, Authorization, and Accounting) that authorizes and manages the mobile devices is processing the standardization for various application services for the purpose of the standardization of authentication, authorization, and accounting to provide safety and reliability of various services and protocols of both wired and wireless network. However, even if AAA exists the development of network varies vulnerabilities and attack types, and accordingly the exposure of information appears as the biggest problem. Therefore, this study suggests the safe authentication method that protects against information exposure by guaranteeing anonymity of service with temporal ID, and provides efficiency because AAA authentication server is based on the ticket given to a service server without the need of re-authentication when mobile node authorized from the AAA authentication server receives service.
引用
收藏
页码:105 / 117
页数:13
相关论文
共 50 条
  • [21] Anonymity guarantees of the UMTS/LTE authentication and connection protocol
    Ming-Feng Lee
    Nigel P. Smart
    Bogdan Warinschi
    Gaven J. Watson
    International Journal of Information Security, 2014, 13 : 513 - 527
  • [22] A practical authentication protocol with anonymity for wireless access networks
    Chen, Yen-Cheng
    Chuang, Shu-Chuan
    Yeh, Lo-Yao
    Huang, Jiun-Long
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (10) : 1366 - 1375
  • [23] An Authentication Protocol for Ubiquitous Health Monitoring Systems
    Yeh, Chang-Kuo
    Chen, Hung-Ming
    Lo, Jung-Wen
    JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2013, 33 (04) : 415 - 419
  • [24] Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems
    Rahman, Musfiq
    Sampangi, Raghav V.
    Sampalli, Srinivas
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 910 - 915
  • [25] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [26] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    Madhusudhan, R.
    Shashidhara, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 82 - 103
  • [27] Anonymity guarantees of the UMTS/LTE authentication and connection protocol
    Lee, Ming-Feng
    Smart, Nigel P.
    Warinschi, Bogdan
    Watson, Gaven J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (06) : 513 - 527
  • [28] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [29] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [30] Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function
    Saleem, Muhammad Asad
    Ghaffar, Zahid
    Mahmood, Khalid
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Khan, Muhammad Khurram
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (22) : 16613 - 16622