Font Size: a A A

Research On Secure Anoymous Identity Technology For Roaming Wireless Network

Posted on:2013-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:W Y ZhouFull Text:PDF
GTID:2218330374455610Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the constant interconnection between wireless mobile network and the Internet, wireless mobile communication network will become one of the most potential for development of commercial finance and technical fields of study. By their mobile device, The users could achieve communication services and multimedia data transmission for global coverage anytime and anywhere, which is a prominent symbol of technological progress and social development. This kind of flexible service have a profound impact on people lives. At the same time, It also brings a complex security problems:How to ensure user pricacy information in a wireless network can be safe and effective transmission. Authentication protocols based on cryptography techniques is a kind of way to solve such security issues. Under the premise of meeting the required of communication network, we must ensure the security of the authentication protocol first, to prevent users from loss of privacy and untracked. Make sure the identity of the mobile user to be safe in roaming communication. Therefore, Anonymous identity authentication technology is of great significance and research value.This paper proposes an anonymous identity authentication based on the self-certified public key system which can achieve mutual anonymity in wireless roaming communication. Introduce each stage detailed and analyse the characters of it. The new protocol not only can achieve the anonymity of roaming user to foreign network agency, but also can be anonymity for home network agency. The new protocol can achieve the security goals: mutual anonymous authentication, data integrity and non-repudiation. It is showed that the proposed scheme not only can overcome the weaknesses of the previous related schemes, but also can improve the efficiency of roaming process. Finally we describe the new protocal in an abstact progress, design the ideal functions and protocols for digital signature and identity-based anonymous authentication key exchange, then analyzed the indistinguishability of combination protocol in ideal, real environment and mixed model. By Universal Composabl theory, We can prove the safety of protocol.
Keywords/Search Tags:the wireless communication network, Anonymious identityauthentication, Self-certified public key, Universally composable
PDF Full Text Request
Related items