An AAA scheme using ID-based ticket with anonymity in future mobile communication

被引:4
|
作者
Moon, Jong Sik [1 ]
Lee, Im-Yeong [1 ]
机构
[1] Soonchunhyang Univ, Div Comp Sci & Engn, Asan 336745, Chungcheongnam, South Korea
关键词
Authentication; ID-based; Key; One-time password; Ticket;
D O I
10.1016/j.comcom.2010.06.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An AAA protocol is an information protection technology that systematically provides authentication, authorization and accounting functions not only in existing wired networks, but also in rapidly developing wireless networks. Currently, standardization of various applied services is in progress and involves AAA standardization for a mobile user in a wireless network. Various studies have considered using AAA with a roaming service in a mobile IPv6 network, between heterogeneous networks. In this paper, we proposed an ID-based ticket for user authentication with a mobile device in a ubiquitous environment. Service is seamless, even when a mobile device moves from the home network to a foreign network. In addition, since the ticket is renewed from the foreign network, the overhead of the home authentication server is reduced, and the anonymity ID guarantees anonymity during service. (C) 2010 Published by Elsevier B.V.
引用
收藏
页码:295 / 304
页数:10
相关论文
共 50 条
  • [21] ID-Based key agreement with anonymity for ad hoc networks
    Chien, Hung-Yu
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 333 - 345
  • [22] ID-based signcryption scheme using extended chaotic maps
    Wang Caifen
    Kang Burong
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 776 - 779
  • [23] An efficient ID-based user identification scheme for mutual authentication in mobile environments
    Chang, Chin-Chen
    Yang, Jen-Ho
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2006, 9 (03): : 537 - 548
  • [24] A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
    Xiong Li
    Junguo Liao
    Saru Kumari
    Wei Liang
    Fan Wu
    Muhammad Khurram Khan
    Wireless Personal Communications, 2015, 85 : 263 - 288
  • [25] A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
    Li, Xiong
    Liao, Junguo
    Kumari, Saru
    Liang, Wei
    Wu, Fan
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 263 - 288
  • [26] ID-based Signature Scheme with Tight Reduction
    Xin Xiangjun
    Huang Shoujia
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 347 - 351
  • [27] A Novel ID-Based Anonymous Signcryption Scheme
    Zhang, Jianhong
    Gao, Shengnan
    Chen, Hua
    Geng, Qin
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 604 - 610
  • [28] A Practical ID-Based Group Signature Scheme
    Cheng, Xiangguo
    Zhou, Shaojie
    Yu, Jia
    Li, Xin
    Ma, Huiran
    JOURNAL OF COMPUTERS, 2012, 7 (11) : 2650 - 2654
  • [29] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [30] A new ID-based broadcast encryption scheme
    Yang, Chen
    Cheng, Xiangguo
    Ma, Wenping
    Wang, Xinmei
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 487 - 492