Font Size: a A A

Research On Anonymous Handover Authentication Protocols Of Wireless Networks

Posted on:2019-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y B ZengFull Text:PDF
GTID:2428330566470987Subject:Military cryptography
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of wireless network technology and the proliferation of mobile devices,various types of mobile nodes form multiple types of wireless networks.However,open wireless channels,resource-constrained wireless terminals and structurally different network topologies all present enormous challenges to the security of wireless networks.As the performance of mobile devices continues to increase,the mobile Internet business is becoming more and more abundant.Unlike traditional web browsing,email transmission,and information push applications,emerging real-time services have stringent requirements for network delay.For example,the delay required by the VoIP is within 50 milliseconds,and that required by the streaming media application is within 150 milliseconds.The mobile node accesses the wireless network through the access point.Since the coverage of the access point is limited,the mobile node that is performing real-time services often needs to switch between different access points in order to maintain the network connection.How to perform fast and safe roaming handover is a key issue that needs to be solved.For mobile users,in addition to the confidentiality of transmission information,it is also hoped that privacy information such as identity and location can be protected.It is worth noting that the resources of the mobile terminal in terms of computing,storage,and power supply have great limitations and it should be fully considered when designing related security protocols.This paper starts from the point of frequent roaming handover of massive devices in wireless networks,and aims to implement secure and efficient handover authentication.It studies on several types of handover authentication protocols.The main research work includes as follows:1.A priority-aware handover authentication protocol based on attribute-based encryption is proposed.The attribute description characterizes the user features,which naturally helps to realize the user anonymity and achieve the goal of privacy protection.The user can be differentiated according to the priority,and it realizes fine-grained access control during the handover process.Therefore,the proposed protocol not only guarantees the required security,but also provides a user priority authentication mechanism,while achieving high efficiency.2.An anonymous handover authentication protocol based on attribute-based signature is proposed.The inherent identity information hiding feature of the attribute-based signature scheme helps to achieve users' anonymity for the protocol.Aiming at the problem that the high computation complexity of the existing attribute-based signature scheme is not suitable for the wireless network handover authentication,a new attribute-based signature scheme is designed.Based on it,an anonymous handover authentication protocol is proposed,which takes into account both security and computational efficiency.3.An existing handover authentication protocol is improved.One existing protocol uses bilinear pairing,while bilinear pairing is a computationally complex cryptographic operation.Aiming at the lack of efficiency of the handover authentication protocol using bilinear pairing operation,an improved protocol without bilinear pairing is proposed.The improved protocol satisfies the required security property of handover authentication protocols while significantly improving efficiency.
Keywords/Search Tags:Wireless Networks, Handover Authentication, Anonymity, Security, Privacy Protection
PDF Full Text Request
Related items