An AAA scheme using ID-based ticket with anonymity in future mobile communication

被引:4
|
作者
Moon, Jong Sik [1 ]
Lee, Im-Yeong [1 ]
机构
[1] Soonchunhyang Univ, Div Comp Sci & Engn, Asan 336745, Chungcheongnam, South Korea
关键词
Authentication; ID-based; Key; One-time password; Ticket;
D O I
10.1016/j.comcom.2010.06.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An AAA protocol is an information protection technology that systematically provides authentication, authorization and accounting functions not only in existing wired networks, but also in rapidly developing wireless networks. Currently, standardization of various applied services is in progress and involves AAA standardization for a mobile user in a wireless network. Various studies have considered using AAA with a roaming service in a mobile IPv6 network, between heterogeneous networks. In this paper, we proposed an ID-based ticket for user authentication with a mobile device in a ubiquitous environment. Service is seamless, even when a mobile device moves from the home network to a foreign network. In addition, since the ticket is renewed from the foreign network, the overhead of the home authentication server is reduced, and the anonymity ID guarantees anonymity during service. (C) 2010 Published by Elsevier B.V.
引用
收藏
页码:295 / 304
页数:10
相关论文
共 50 条
  • [31] Efficient ID-based certificateless signature scheme
    Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China
    Tongxin Xuebao, 2008, 2 (87-94):
  • [32] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [33] Novel ID-Based Group Signature Scheme
    Zhang, Jianhong
    Geng, Qin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12634 - 12637
  • [34] Comment on an ID-based Broadcast Signcryption Scheme
    Zhang, Jianhong
    Geng, Qin
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
  • [35] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):
  • [36] An Efficient ID-Based Ring Signcryption Scheme
    Li, Fagen
    Xiong, Hu
    Yu, Yong
    2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 542 - 546
  • [37] An ID-based multi-signature scheme
    Meng, Tao
    Zhang, Xinping
    Sun, Shenghe
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
  • [38] Security of ID-based key exchange scheme
    Scott, M
    ELECTRONICS LETTERS, 1998, 34 (07) : 653 - 654
  • [39] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [40] A SIMPLE ID-BASED SCHEME FOR KEY SHARING
    TSUJII, S
    CHAO, JH
    ARAKI, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 730 - 734