Font Size: a A A

Mobile User Authentication Protocols With Anonymity For Roaming Service

Posted on:2014-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:M J BaoFull Text:PDF
GTID:2268330395491263Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of communication technology, lots of mobile users may get services from various foreign agents when they roam to different foreign networks. Therefore, it is important to keep privacy-preserving and security for mobile users. Authenticated key agreement protocols are the base for constructing secure networks in global mobility networks (GLOMONET). since it can provide authenticating the mobile users and establishing the session key, which transmitting the messages in public networks.The paper focuses designing and analyzing of mobile user anonymous authentication protocols for roaming service in GLOMONET. The main achievements are summarized as follows:1. In2011, Chen et al. proposed a lightweight and provably secure user authentication scheme with anonymity for roaming service. We show that their scheme is susceptible to off-line password attack, also it does not provide fair session key generation or user untraceability. The scheme also lacks of user friendliness and perfect forward secrecy. To remedy these weaknesses, we propose a new scheme whose security is ensure through the formal verification.2. In2012, Li and Lee proposed a user authentication and privacy preserving scheme with smart card for wireless communications. We demonstrate that Li and Lee’s scheme is vulnerable to off-line password guessing attack. To remedy these weaknesses, we propose a new scheme whose security is ensure through the formal verification.3. We propose a robust anonymous two-factor authentication scheme for roaming service in global mobility networks which satisfies the following security function requirements:Anonymity and Untraceability; Security:Mutual Authentication; Session key security and fairness; User friendly; Efficiency. The security of the proposed scheme is ensuring through the formal verification and security proof in the random oracle model.
Keywords/Search Tags:Mobile Networks, Protocols, Authentication, Session Key, Anonymity
PDF Full Text Request
Related items