Font Size: a A A

Research On The Authentication Technique And Application In Mobile Environments

Posted on:2009-05-25Degree:DoctorType:Dissertation
Country:ChinaCandidate:J WangFull Text:PDF
GTID:1118360308961399Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of mobile communication technology, many mobile communication networks have been widely used in different application domains.When the definition of personal communication is presented, integration of heterogeneous mobile communication networks is the latest trend in the next generation mobile communication network. Underlying the new mobile environments, security problems becomes complexity than in the single network environments.So security threatens, security requirements and security policies are changed in this new mobile environments.This research has drawn more and more enthusiasm. Firstly, it should integrate many different security mechanisms to support security services;the second is to analyze new security requirements, and to design new architecture and schemes.This dissertation systemically researches the security problems about heterogeneous mobile communication networks.The main works are as the following:1.In order to reduce the security threatens in heterogeneous mobile communication networks, we present the new security architecture to meet security requirements.This architecture is composed of three protocol layers, four device domains and security specialties.Comparing with other existed architecture, we add new function entities, such as public key infrastructure, application server; also add new security specialties for application domain and user domain. So the security architecture meets the heterogeneous mobile environments, that it could give reference to design security mechanism.2.Proposes a roaming network access authentication protocol for mobile users among different heterogeneous mobile communication networks, that the protocol uses the mix cryptography mechanism and supports authentication for mobile users among different trusted domains. Furthermore in order to meet other new security requirements, the secret splitting mechanism is used to protect users'privacy, so the anonymous authentication is provided between users and networks.Also the hash chain is used to reduce the system cost of reauthentication between mobile users and networks.3.Based on the pervasiveness of SMS(Short Message Service), the authentication protocol uses SMS messages to transmit authentication data. So an effective authentication protocol with lower cost of computation and communication is presented. The protocol provides the mutual authentication between any users and any application services in local area or different trusted areas. Furthermore, the protocol could be used widely for any mobile environments.4.Based on the analysis of security threatens and security requirements for mobile station in the user domain, we propose the security architecture for mobile station, and use the mobile trusted module to enhance mobile station platform's security. We present a mutual authentication protocol for user, mobile equipments and USIMs.This protocol uses in secure mobile station platform. Using the results of authentication, the access control policies are proposed. Also the biometric identification is used in the protocol for user identity authentication. Because binary neural networks are often used for classification of biometric identification, we use the discrete real neural networks to compute discrete real functions, which is simple than using binary neural networks.5.For the security requirements for multi-users secure end-to-end communication, using mix cryptography mechanism and hash function, that a simple authentication and key distribution protocol is presented. The protocol achieves identity anonymity, dynamic joining or quitting and encryption key renewal mechanism. In order to meet end-to-end secure communication between two users, bases on three-party Diffie-Hellman key negotiation algorithm, a novel key management scheme with trusted center is presented. Using 3G (three generation) network's security mechanism, the proposed protocol only adds the new authentication flows to provide the mutual authentication. Because the protocol needs no extra shared secret, it reduces the key storage and complexity of key management.
Keywords/Search Tags:Authentication, Key management, Access control, Security Architecture, Mobile environments
PDF Full Text Request
Related items