Font Size: a A A

Efficient And Anonymous Authentication Scheme In Mobile Wireless Networks

Posted on:2017-08-16Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2348330512462253Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Various wireless communication technologies have been developed and deployed because of the increasing access requirements. However, the inherent features of wireless networks, including openness of wireless channel, limited-resource of wireless terminals, dynamic wireless topology and complexity of wireless environment, bring many great security risks in mobile wireless networks. Meanwhile, these features also lead to a number of obstacles in the design and implementation of security schemes for wireless networks. Among which, secure authentication with privacy protection is the key issue in wireless network security. For most of users in wireless networks, they hope that the Mobile Internet Service Provider can not only provide Internet access, but also protect their privacy. Therefore, the research on efficient and anonymous authentication has attracted great attention from both academia and industry.Through the analysis on current demand and status of wireless network security, this thesis mainly focuses on designing efficient and secure anonymous authentication schemes. There are three main contributions in this thesis:1. An efficient handover authentication scheme with user anonymity and untrace-ability:By using the elliptic curve cryptography and pseudo identity mechanism in an integrated WiMAX and WiFi network, this scheme can ensure the security as well as a high efficiency.2. A lightweight anonymous authentication scheme based on ring signature:This scheme achieves user anonymity by taking advantages of ring signature mech-anism. Meanwhile, it utilizes lightweight operations to achieve the purpose of reducing computational overhead.3. An anonymous data authentication scheme based on ID-based linkable ring sig-nature:Under the background of electric vehicle test-bed program, by using ID-based linkable ring signature mechanism, this scheme ensures data authen-ticity and protects user privacy.
Keywords/Search Tags:mobile wireless network, security, authentication, efficiency, privacy, anonymous
PDF Full Text Request
Related items