Strong roaming authentication technique for wireless and mobile networks

被引:14
作者
He, Daojing [1 ]
Chen, Chun [1 ,2 ]
Chan, Sammy [3 ]
Bu, Jiajun [1 ,4 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou, Zhejiang, Peoples R China
[2] Zhejiang Univ, Inst Comp Software, Hangzhou, Zhejiang, Peoples R China
[3] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[4] Zhejiang Univ, Dept Digital Media & Network Technol, Hangzhou, Zhejiang, Peoples R China
基金
美国国家科学基金会;
关键词
authentication; security and privacy; roaming service; wireless and mobile networks; SCHEME; ANONYMITY;
D O I
10.1002/dac.1387
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network-enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed privacy-preserving universal authentication protocol, Priauth, exceeds the security and efficiency of other authentication techniques. This paper studies the existing roaming authentication protocols and shows that they are not strong enough to provide secure roaming services in three aspects. Further, using Priauth as an example, we propose efficient remedies that fix the weaknesses. The experimental results show that the proposed approaches are feasible in practice. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1028 / 1037
页数:10
相关论文
共 19 条
[1]   Congestion-Based Pricing Resource Management in Broadband Wireless Networks [J].
AbuAli, Najah ;
Hayajneh, Mohammad ;
Hassanein, Hossam .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (08) :2600-2610
[2]  
[Anonymous], 1999, X962 ANSI
[3]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[4]  
European Telecomm. Standards Inst. (ETSI), 1993, GSM 02 09 SEC ASP
[5]   Privacy-Preserving Universal Authentication Protocol for Wireless Communications [J].
He, Daojing ;
Bu, Jiajun ;
Chan, Sammy ;
Chen, Chun ;
Yin, Mingjian .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) :431-436
[6]   A strong user authentication scheme with smart cards for wireless communications [J].
He, Daojing ;
Ma, Maode ;
Zhang, Yan ;
Chen, Chun ;
Bu, Jiajun .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :367-374
[7]  
Juels A, 1999, P NDSS 99
[8]   Security enhancement on a new authentication scheme with anonymity for wireless environments [J].
Lee, Cheng-Chi ;
Hwang, Min-Shiang ;
Liao, I-En .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) :1683-1687
[9]  
Michael S, MULTIPRECISION INTEG
[10]  
Miyaji A, 2001, IEICE T FUND ELECTR, VE84A, P1234