Provable secure authentication protocol with anonymity for roaming service in global mobility networks

被引:49
作者
Zhou, Tao [2 ,3 ]
Xu, Jing [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[3] Natl Engn Res Ctr Informat Secur, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Anonymity; Wireless roaming; Provable security; SCHEME;
D O I
10.1016/j.comnet.2010.08.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is an important security mechanism for recognizing legal roaming users. The emerging global mobility network, however, has called for new requirements for designing authentication schemes due to its dynamic nature and vulnerable-to-attack structure, which the traditional schemes overlooked, such as user anonymity. In this paper, we propose an efficient wireless authentication protocol with user anonymity for roaming service. We also introduce a formal security model suitable for roaming service in global mobility networks and show that the proposed protocol is provable secure based on this model. To the best of our knowledge, this paper offers the first formal study of anonymous authentication scheme for roaming service in global mobility networks. In addition, we point out some practical attacks on Chang et al.'s authentication scheme with user anonymity for roaming environments. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:205 / 213
页数:9
相关论文
共 16 条
[1]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[2]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[3]  
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[4]   Extensions to an authentication technique proposed for the global mobility network [J].
Buttyán, L ;
Gbaguidi, C ;
Staamann, S ;
Wilhelm, W .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2000, 48 (03) :373-376
[5]   Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin ;
Chi, Yen-Chang .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :611-618
[6]  
Hazay C, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P491
[7]   A self-encryption mechanism for authentication of roaming and teleconference services [J].
Hwang, KF ;
Chang, CC .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2003, 2 (02) :400-407
[8]   Security enhancement on a new authentication scheme with anonymity for wireless environments [J].
Lee, Cheng-Chi ;
Hwang, Min-Shiang ;
Liao, I-En .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) :1683-1687
[9]  
Lee CY, 2005, Proceedings of the ISA/IEEE 2005 Sensors for Industry Conference, P1
[10]  
Lin CH, 2004, P 2 INT C ADV MOB MU, P339