Font Size: a A A

Research Of Wireless Network Roaming Authentication And Batch Verification

Posted on:2014-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhaoFull Text:PDF
GTID:2268330425956193Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the development of modern network communication technology, the wireless network as an extension of traditional network, has been widely used in many special environment, and people’s daily life and work have been more convenient than before. With the rapid development of wireless network, wireless network security has also become an issue of concern. Due to the open transmission property inherent to wireless network, limitations on computing power, storage capacity of wireless terminal and the dynamic nature of network topology, most of the security protocols used in traditional network can not be directly applied to wireless network. At the same time, we must consider more problems for the security protocols used in wireless network, especially when designing authentication protocols during the roaming period.Identity based authentication means that not only a server should verify a user’s identity, but also the user should verify the server’s identity. Due to the limited computing power of mobile terminals and the characteristic of wireless networks, the authentication model for wired network is no longer applicable to wireless network. When applying PKI authentication technology in the wireless network, it is necessary to exchange digital certificates, which requires more bandwidth consumption. So it will take a long time and delay to accomplish the authentication process. Therefore, people pay more and more attention to design protocols for wireless network authentication.In this dissertation, we concentrate on constructing a wireless network authentication protocol and batch verification for a multi-signature scheme. The major part of this dissertation can be summarized as the following:1. Wireless network identity authentication and authorization model based on IBE:As a server can reveal a user’s identity by listening the transmitted information, the anonymity of user’s identity is an issue to be handled in wireless authorization model. Although some authentication protocols provide rigorous authentication functionality, they require the assistance from external devices such as smart card. So these schemes are not universally applicable. To handle this issue, we propose a new wireless network identity authentication and authorization model based on IBE. By using the ID-based ticket for user authentication, users in our scheme can access services through the ticket. When users roam from into a foreign network, they can also access services in the foreign network by pass the authentication by the foreign network with the help of home network. The ticket is renewed by the home network to guarantee the anonymity of users. Analysis shows that our scheme can also be secure against replay attack and impersonation attack.2. Batch Verification for an ID-Based RSA Multi-Signature Scheme:Modern electronic commerce requires the cooperation among multiple persons. For example, multiple signers may wish to jointly generate a signature for a document. A digital multi-signature scheme allows a group of signers to sign a same message and generate a fixed-size signature data, so that the verifier can verify the validity of the multi-signature. To verify multiple multi-signatures generated by the same group of users, if we verify these multi-signatures one by one, we need spend a lot of time and computational overhead. To improve the verification efficiency, especially in the wireless environment, we present a variant of a previous identity-based RSA multi-signature scheme and propose a batch verification scheme for the variant. On the one hand, the security analysis shows that the scheme can resist multi-signer’s collusion attack and adaptive attack such that a set of signatures that contains at least an invalid signature cannot pass the batch verification. On the other hand, the performance analysis shows that our scheme can greatly improve the efficiency of verification for multiple signatures.
Keywords/Search Tags:Wireless network security, Identity based authentication, Anonymity, Multi-signature, Batch verification
PDF Full Text Request
Related items