An authentication protocol offering service anonymity of mobile device in ubiquitous environment

被引:6
|
作者
Park, Jong Hyuk
机构
[1] Seoul National University of Science and Technology, 172, Gongreung 2-dong, Nowon-gu
关键词
Anonymity; Authentication; Mobile; Ubiquitous;
D O I
10.1007/s11227-010-0467-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of ubiquitous era, various devices and services using wireless network are increasing. For communications in wireless network, mobile devices are used and various services are increasingly provided through mobile devices. The AAA (Authentication, Authorization, and Accounting) that authorizes and manages the mobile devices is processing the standardization for various application services for the purpose of the standardization of authentication, authorization, and accounting to provide safety and reliability of various services and protocols of both wired and wireless network. However, even if AAA exists the development of network varies vulnerabilities and attack types, and accordingly the exposure of information appears as the biggest problem. Therefore, this study suggests the safe authentication method that protects against information exposure by guaranteeing anonymity of service with temporal ID, and provides efficiency because AAA authentication server is based on the ticket given to a service server without the need of re-authentication when mobile node authorized from the AAA authentication server receives service.
引用
收藏
页码:105 / 117
页数:13
相关论文
共 50 条
  • [31] Design of the mobile agent anonymity framework in ubiquitous computing environments
    Kim, Jae-gon
    Kim, Gu Su
    Eom, Young Ik
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (12) : 2990 - 2993
  • [32] Enhanced secure mutual authentication and key agreement scheme with user anonymity in ubiquitous global mobility networks
    Gope, Prosanta
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 160 - 167
  • [33] A framework for continuous, transparent mobile device authentication
    Crawford, Heather
    Renaud, Karen
    Storer, Tim
    COMPUTERS & SECURITY, 2013, 39 : 127 - 136
  • [34] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [35] Mobile IP registration protocol with user anonymity
    Dang, Lan-Jun
    Kou, Wei-Dong
    Cao, Xue-Fei
    Fan, Kai
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2008, 35 (02): : 282 - 287
  • [36] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [37] User Authentication with Anonymity for Roaming Service with Smart Cards in Global Mobility Networks
    Chen, Chia-Chen
    Huang, Hui-Feng
    Liu, Cheng-Yi
    Lai, Chi-Wen
    AD HOC & SENSOR WIRELESS NETWORKS, 2014, 20 (1-2) : 5 - 19
  • [38] Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 457 - 467
  • [39] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    Multimedia Tools and Applications, 2017, 76 : 13401 - 13423
  • [40] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423