Font Size: a A A

Research On Authentication And Key Management Techniques For Wireless Community

Posted on:2013-02-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:J GuFull Text:PDF
GTID:1118330362467328Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless communication technologies, wirelesscommunity with its diversified service has greatly facilitated the life of commu-nity residents. However, communication systems in the open wireless networkenvironment are more prone to sufer from security threats and diferent types ofattack than the traditional wired network. It is an urgent issue to provide strongsecurity for the wireless community network environment. The technology of au-thentication and key management play an extremely important role in ensuringthe security of information systems since both of them are the crucial foundationfor the wireless network security. Therefore, it is of great significance to studythe method and techniques of authentication and key management in wirelessnetwork. This dissertation makes a relatively thorough research on the relatedtechniques of authentication and key management for wireless community. Themain contributions are as following:1. The traditional wireless communications solutions only lay one-sided em-phasis on the user authentication. To tackle this problem, a two-factorauthentication scheme based on one-way hash function using nonce is pro-posed. The scheme which is proven secure in the random oracle model notonly achieves mutual authentication between the server and the user, butalso provides session key agreement for the two parties. In addition, accord-ing to the issue of privacy protection needs in the scenarios such as onlinefinancial transactions, secret ballot and other applications, anonymous au-thentication techniques have been studied. On the basis of security analysisof two related anonymous authentication schemes, we propose a dynamicID-based anonymous authentication scheme, and prove it secure in the ran- dom oracle model. The scheme optimizes the computational complexity ofthe system.2. Taking the advantage of high accuracy of iris recognition technology, athree-factor authentication scheme with anonymity and traceability is pro-posed. The proposed scheme achieves true three-factor authenticationwhich means that all the three factors are verified by the server, whichis diferent from the previous ones. Our proposal is also proven secure inthe random oracle model. Besides, by adding a location factor, we proposea four-factor authentication scheme for high level security applications. Theproposed scheme is quite suitable for users with mobile in the wireless net-work application environment.3. The secret handshake between members of the group communication isstudied. We propose an improved secret handshakes scheme with unlinka-bility. Security of our scheme is reduced to the BDH problem in the randomoracle model. Through comparing the performance with related schemes,it is indicated that the proposed scheme improves the calculation efciency.4. According to the characteristic of being prone to data packet loss in theunstable wireless network, we propose two kind of self-healing key distri-bution schemes respectively to address the problem of session key manage-ment for group communication. One scheme using Shamir (t, n) thresholdsecret sharing technique is proven unconditionally secure and achieves for-ward secrecy and backward secrecy. The scheme realizes constant storagecomplexity for the personal secret key of each user. The other scheme isbased on vector space secret sharing and one-way hash chain, it demon-strates good scalability in the large group communication where the usersswitch quickly and network topology changes frequently. The latter schemeis proven to be computationally secure and achieves both forward secrecyand backward secrecy.
Keywords/Search Tags:Wireless community, multi-factor authentication, anonymous authentication, provable security, random oracle model, group communication, self-healing key distribution
PDF Full Text Request
Related items