Font Size: a A A

Research On Lightweight Anonymous Security Authentication Protocol On Wireless Roaming Service

Posted on:2019-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:B YangFull Text:PDF
GTID:2428330626952129Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the mobile devices,the users' demands of the coverage area and quality of service of mobile networks are increasing day by day.However,the cost of the way to expand coverage and quality of service by increasing the quantity of the network devices is enormous.Therefore,wireless roaming service technology emerges as the times require.This technology can support users to enjoy undifferentiated wireless network services between different network management areas without geographical restrictions.Although some researchers have paid attention to the security problems in the process of wireless roaming during this years,there are still some unsolved problems.Attackers often access data or services illegally without authorization,thus affecting the quality of wireless roaming services,or even revealing user privacy and causing unlawful infringement on users.However,due to the relatively limited power and low computing power of mobile devices,traditional authentication protocols can not adapt to wireless roaming networks.In order to solve the above problems,we improved the Random Oracle Model and re-described the attack means and the ability of the attackers,and we put forward a more perfect security requirement.Meanwhile,a new mathematical model is defined.This model is more suitable for the security proof of wireless roaming authentication protocol.Based on this model,we propose a password-based lightweight wireless roaming authentication protocol.The protocol uses ECDSA,a lightweight encryption technology,which to construct elliptic curve groups y2=(x3 + ax + b)mod p satisfying the conditions in the finite field Fp to generate public-private key pairs for signature to provide non-repudiation and non-forgery for messages transmitted between communication entities.At the same time,the protocol uses Pseudo-Random-Identity to protect the anonymity and traceability of users.Finally,the security proof of the protocol under the new model is given and we compared our protocol with other representative wireless roaming protocols in terms of security attributes and computational cost.The security model proposed in this paper can assist the formal proof of the security of the related protocols,which is of great significance to the research of wireless roaming authentication protocols.At the same time,through analysis and experimental comparison,the proposed protocol has high security attributes.On the premise of guaranteeing the safe establishment of session key,it can minimize the computing costs overhead of the user and protect the privacy of the users.
Keywords/Search Tags:Wireless roaming service, Security authentication protocol, Security model, Formal proof, Privacy protection
PDF Full Text Request
Related items