Font Size: a A A

Research On Mobile Internet Authentication Protocols And Applications

Posted on:2013-06-23Degree:DoctorType:Dissertation
Country:ChinaCandidate:S ShaoFull Text:PDF
GTID:1318330518991292Subject:Information security
Abstract/Summary:PDF Full Text Request
In recent years, accompanied by the advancement of mobile communication technology and three networks convergence, new security challenges are posed by emerging mobile internet which is consists of several heterogeneous subnets. End-users of the emerging mobile internet are provided with previously impossible internet access anytime and anywhere. Therefore, it is imperative for security researchers and practitioners to analyze existing vulnerabilities, understand potential threats, and design novel defense mechanisms for this new ubiquitous network environment. In order to achieve this goal, on the one hand, the security issues for each individual subnet with different access method and computing performance should be studied; on the other hand, new security needs generated by network emerging should be considered to design corresponding security mechanisms.In this dissertation, the authentication protocols of mobile Internet are studied. First, the security threats of networks, terminals, and applications in mobile internet are analyzed, the security needs are summarized, and depth analysis of the key technology authenticated key agreement is made. Second, several authentication protocols for mobile internet are suggested, including lightweight equipment authentication,password-based smart card authentication, ID-based authenticated and key agreement, attribute-based authenticated and key agreement and Kerberos-based muti-user authentication. Finally a mobile internet secure communication system, which supports the secure communication of SMS, MMS, VOIP and packet data, and provides mobile internet application layer communications security, is designed and implemented.The system consists of two parts: a client including mobile terminal and smart card, and a server including security gateway and key management center. The system realizes end-to-end encryption and virtual private network(VPN) between mobile terminal and security gateway, and supports various channels like 3G/wifi/GPRS and various applications,such as email, mobile office, etc. The VPN of the system has been applied on the Lenovo Lephone, and the end-to-end encryption of SMS and MMS has been applied in China Mobile MAS business system.The contributions of the thesis are summarized as follows:1. A lightweight authentication protocol for mobile devices with low computing capacity to join mobile internet is proposed. The protocol,which is based on hash chain, minimizes the terminal calculation consumption while increasing network servers computing consumption as little as possible, and can quickly build trust relationship between network servers and client devices. Besides, it can provide extensibility,resist various attacks such as user track and is suitable for RFID, sensor network and other networks where terminal's computational capability is limited.2. A password-based authentication protocol utilizing smart card that can be used in user access is proposed, and its security is proved by BAN logic. The protocol not only keeps the mutual authentication between user and server, but also provides user anonymous to server to prevent application server from analyzing user behaviors and positions. The protocol also introduces the trusted third party, which can be used by the application server to trace malicious users. The protocol is implemented only with the hash algorithm, therefore both the computing and communication cost is low.3. The research of existing authenticated key agreement protocols suggests that most of the existing agreements can't resist intermidiate results reveal attack. An efficient ID-based authenticated key agreement(IDAKA) protocol named SRYY is proposed based on the former research and its security is proven under the seCK model. The protocol is appropriate for mobile environment, for it can resist all the currently known attacks, and achieve more security characteristics as well as lower computation and communication consumption compared to the existing protocols. This protocol is the first IDAKA protocol proven secure in seCK model.4. A new attribute based encryption (ABE) protocol that supports key revocation is proposed. In this protocol, the key revocation information is preserved in a cipher text. When deciphering, the scheme will judge if the decryption key belongs to the revocation set. If it does,the cipher text won't be decrypted. It's flexible for the encryptor to adjust the key revocation set everytime as required. Meanwhile, an attribute-based authenticated key agreement (ABAKA) protocol, which can achieves both anonymous authentication and fine-grained access control is proposed. The protocol is proven secure in the security model of attributed-based authenticated key agreement based on seCK model. A novel muti-user access and key distribution is also suggested by the combination of Kerberos and former proposed ABE protocol with revocation. Via push notifications, a user in the protocol can invite the other users to join the communication, and muti-user authentication and group key distribution can be achieved in one broadcast message sent by the server.
Keywords/Search Tags:mobile internet, secure communication, user authentication, key exchange, key distribution
PDF Full Text Request
Related items