Font Size: a A A

Research On Wireless Roaming Authentication Protocols

Posted on:2017-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Q R BaoFull Text:PDF
GTID:2308330488953125Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years, along with the development of network technology wireless networks, the wireless network has become popular. This change is not only promote the network quality but also improves the portability and intelligent of the mobile devices. For users to be able to use the wireless network convenient, the researchers used wireless roaming to expand the coverage of wireless networks. However, there are some security problems in the process of wireless roaming. Service providers need to confirm the legitimacy of the user’s identity before providing services to the user, and the user’s privacy information may be leaked in this process; at the same time, the transmission of messages via wireless network is not safe due to the openness of wireless network. Therefore, in order to solve the safety problems wireless roaming agreement has become a widely concerned topic.At present, although the research on wireless roaming is relatively mature, a large number of wireless roaming agreements are presented; there is still a lack of analysis for the proposed wireless roaming agreements in safety and efficiency. In addition, the information transmission in wireless network environment has the following characteristics:messages broadcast, high packet loss rate and the error rate, the limitations of mobile devices in computing capacity and other aspects. Due to these characteristics, there are three main problems of the wireless roaming study:the cross-domain identity authentication, key agreement and user privacy protection, so the important goal of the research is to design a wireless roaming agreement to solve the three major problems safely and efficiently.This paper firstly analyzes the structure of wireless roaming agreement and the specific research issues, then comprehensive introduces security targets of wireless roaming agreements should be reached. Second, the paper systematically summarizes the proposed wireless roaming agreements, then divides the agreements into 4 categories:Password-Based wireless roaming agreement, ID-Based wireless roaming agreement, CA-Based wireless roaming agreement and the other wireless roaming agreement. Then analyzes the security and operating efficiency of the representative agreements, at the same time, we compare the research status in the safety and efficiency of the Password-Based wireless roaming agreements with chart.More importantly, this paper proposed an efficient identity-based authentication and key agreement for wireless roaming. The protocol has the following characteristics: Firstly, the proposed protocol has a high operating efficiency, pre-calculated and hash algorithm reduces the computation of the user side mobile devices, and the roaming user only needs one message transmission to achieve authentication and session key establishment with the roaming server; Secondly, the protocol achieves the security requirements of user anonymity and untraceability, which can protect users’ personal information; Thirdly, the protocol achieves a high level of security, which satisfies the key establishment, PFS, KCIR and other security attributes.At last, the challenges and future research directions of the roaming wireless agreements are pointed out.
Keywords/Search Tags:wireless roaming, cross domain, Password-Based, ID-Based, authentication and key agreement, privacy protection
PDF Full Text Request
Related items