Mobile IP registration protocol with user anonymity

被引:0
|
作者
Dang, Lan-Jun [1 ]
Kou, Wei-Dong [1 ,2 ]
Cao, Xue-Fei [1 ]
Fan, Kai [1 ]
机构
[1] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
[2] IBM, Beijing 100027, China
关键词
Authentication; -; Calculations;
D O I
暂无
中图分类号
学科分类号
摘要
In order to address the anonymous authentication problem in mobile IP registration, a mobile IP registration protocol with user anonymity is proposed. To construct its temporary identity (TID) in the registration request message, the mobile node (MN) hashes the home agent (HA)'s identity together with a newly established Diffie-Hellman key and performs a bitwise XOR over the MN's real identity and the hashed value. Then HA recalculates the hash value and XORs it with the received TID to derive the MN's true identity. The user anonymity and untractability are achieved in the proposed protocol by the TID, which varies with each registration. Theoretical analysis demonstrates that the proposed protocol accomplishes both strong anonymity and mutual authentication among three mobile IP entities. Compared to the anonymous wireless authentication protocol proposed by Peng et al., the proposed protocol reduces the computation load at the MN.
引用
下载
收藏
页码:282 / 287
相关论文
共 50 条
  • [1] Efficient ID-Based Registration Protocol Featured with User Anonymity in Mobile IP Networks
    Dang, Lanjun
    Kou, Weidong
    Li, Hui
    Zhang, Junwei
    Cao, Xuefei
    Zhao, Bin
    Fan, Kai
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (02) : 594 - 604
  • [2] An Efficient Authentication Protocol with User Anonymity for Mobile Networks
    Li, Huixian
    Yang, Yafang
    Pang, Liaojun
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1842 - 1847
  • [3] NFC-based Mobile Payment Protocol with User Anonymity
    Chen, Shang-Wen
    Tso, Raylin
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 24 - 30
  • [4] Timestamp-based registration protocol in mobile IP
    Wang, L.-M., 1600, Science Press (31):
  • [5] Identity-based mobile IP registration protocol
    Ma, Hua
    Ren, Wei-Chao
    Dang, Lan-Jun
    Wang, Bao-Cang
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 123 - 127
  • [6] An anonymity-preserving mobile user authentication protocol for global roaming services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    COMPUTER NETWORKS, 2023, 221
  • [7] Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    Park, CS
    COMPUTER NETWORKS, 2004, 44 (02) : 267 - 273
  • [8] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325
  • [9] A key management scheme for secure Mobile IP registration based on AAA protocol
    Kang, Hyun-Sun
    Park, Chang-Seop
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (06): : 1842 - 1846
  • [10] Vulnerability of user identification and key agreement protocol with user anonymity
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 515 - +