Anonymous authentication protocols with credit-based chargeability and fair privacy for mobile communications

被引:0
作者
Fan, Chun-, I [1 ]
Huang, Vincent Shi-Ming [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
来源
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS | 2007年 / 4752卷
关键词
mutual authentication; anonymity; fair privacy; cryptography; mobile networks; ubiquitous computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart and tiny mobile phones are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline networks, there are many security threats to mobile network systems and their impact on the security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified documents which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be important issues when mobile users roam to the mobile networks. In this paper, an anonymous authentication scheme will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still make correct bills to charge these anonymous users. Finally, our protocols also achieve the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.
引用
收藏
页码:412 / +
页数:3
相关论文
共 29 条
  • [1] Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy
    Fan, Chun-I
    Huang, Vincent Shi-Ming
    APPLIED SCIENCES-BASEL, 2016, 6 (06):
  • [2] Universal Authentication Protocols for Anonymous Wireless Communications
    Yang, Guomin
    Huang, Qiong
    Wong, Duncan S.
    Deng, Xiaotie
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (01) : 168 - 174
  • [3] Anonymous fair transaction protocols based on electronic cash
    Fan, Chun-I
    Liang, Yu-Kuang
    INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2008, 13 (01) : 131 - 151
  • [4] Security flaws in authentication and key establishment protocols for mobile communications
    Shim, K
    Lee, YR
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 62 - 74
  • [5] Location-based Anonymous Authentication for Vehicular Communications
    Biswas, Subir
    Misic, Jelena
    2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 1213 - 1217
  • [6] Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
    Debiao HE
    Ding WANG
    Qi XIE
    Kefei CHEN
    ScienceChina(InformationSciences), 2017, 60 (05) : 113 - 129
  • [7] Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
    He, Debiao
    Wang, Ding
    Xie, Qi
    Chen, Kefei
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [8] A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks
    Alzahrani, Bander A.
    Chaudhry, Shehzad Ashraf
    Barnawi, Ahmed
    Al-Barakati, Abdullah
    Alsharif, Mohammed H.
    SYMMETRY-BASEL, 2020, 12 (02):
  • [9] A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT
    Hamouid, Khaled
    Omar, Mawloud
    Adi, Kamel
    12TH WIRELESS DAYS CONFERENCE (WD 2021), 2020,
  • [10] Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps
    Kuo, Wen-Chung
    Lin, Chi-Sheng
    Chuang, Chen-Tsun
    Kao, Ming-Chih
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (02): : 208 - 213