Font Size: a A A

Research On Mobile User Authentication Protocals In Wireless Mobile Nework

Posted on:2017-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:H Z LiFull Text:PDF
GTID:2348330482476785Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless networks,the degree of social information is improving significantly.With the integration of wireless mobile network and intelligent mobile terminal equipment,the goal that whether you are in any time and any place can easily get to the internet is able to realize.The importance of confidential and valuable information often need to transfer on the public network,therefore,how to guarantee the privacy and security of roaming mobile users in the process of communication is very important.And authentication protocol with anonymity is the foundation of building secure network environment,it can ensure the security in the open channel by using the method of identification and establishing session password to provide strong security and high reliability authentication services.So it makes the wireless network extensive and convenient and has been widely recognized in the professional field.Identity-based authentication agreement is one of the agreements has been widely used in recent years,this paper was carried out in-depth research on it.The content of this paper is summarized as follows:In the first chapter,firstly we introduce the history and development of cryptography,then we briefly introduce the research status of the authentication key agreement and the mobile user's authentication protocol based on smart card with anonymity in wireless network,finally explain the research content.The second chapter is the foundation of cryptography,it mainly introduces the basic communication model,security threat model and other related knowledge.This theoretical knowledge has laid a solid foundation for this article.The fourth chapter describes the applications of smart cards,and proposes a provable secure mobile user authentication scheme with anonymity based on smart card by use of discrete logarithm cryptosystem.The scheme can reduce the amount of calculation and save storage space,can resist various attacks,so it has good security and high-efficiency.The fifth chapter points out the vulnerabilities in the previously known schemes and proposes an improved user authentication scheme with anonymity by use of elliptic curve cryptosystem.This agreement accords with the requirement of wireless network and can resist the known attacks.The sixth chapter is the function analysis,it mainly introduces the comparison of efficiency and safety,and concluded that the proposed scheme has high efficiency and security.The seventh chapter makes a brief summary and presents some prospects for further studies.
Keywords/Search Tags:Authentication agreement, Anonymous, Smart cards, Security
PDF Full Text Request
Related items