Mobile IP registration protocol with user anonymity

被引:0
|
作者
Dang, Lan-Jun [1 ]
Kou, Wei-Dong [1 ,2 ]
Cao, Xue-Fei [1 ]
Fan, Kai [1 ]
机构
[1] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
[2] IBM, Beijing 100027, China
关键词
Authentication; -; Calculations;
D O I
暂无
中图分类号
学科分类号
摘要
In order to address the anonymous authentication problem in mobile IP registration, a mobile IP registration protocol with user anonymity is proposed. To construct its temporary identity (TID) in the registration request message, the mobile node (MN) hashes the home agent (HA)'s identity together with a newly established Diffie-Hellman key and performs a bitwise XOR over the MN's real identity and the hashed value. Then HA recalculates the hash value and XORs it with the received TID to derive the MN's true identity. The user anonymity and untractability are achieved in the proposed protocol by the TID, which varies with each registration. Theoretical analysis demonstrates that the proposed protocol accomplishes both strong anonymity and mutual authentication among three mobile IP entities. Compared to the anonymous wireless authentication protocol proposed by Peng et al., the proposed protocol reduces the computation load at the MN.
引用
下载
收藏
页码:282 / 287
相关论文
共 50 条
  • [21] An efficient fault tolerance protocol with backup foreign agents in a hierarchical local registration mobile IP
    Hong, CS
    Yim, KW
    Lee, DY
    Yun, DS
    ETRI JOURNAL, 2002, 24 (01) : 12 - 22
  • [22] Enhanced the user's anonymity on the smart card based user authentication protocol
    Lin, Iuon-Chang
    Chang, Tsai-Ling
    ICIC Express Letters, 2012, 6 (06): : 1507 - 1511
  • [23] Performance analysis of Mobile IP regional registration
    Woo, M
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (02) : 472 - 478
  • [24] New authentication protocol providing user anonymity in open network
    Kim, WH
    Yoon, EJ
    Yoo, KY
    INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 414 - 423
  • [25] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    Multimedia Tools and Applications, 2017, 76 : 13401 - 13423
  • [26] A novel wireless authentication protocol preserving user anonymity and untraceability
    Wei, Yongzhuang
    Qiu, Hongbing
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 575 - +
  • [27] Evaluation of mobile IP fast authentication protocol compared to hierarchical mobile IP
    Diab, A
    Mitschele-Thiel, A
    Böringer, R
    WiMob'2005: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol 2, Proceedings: MOBILE NETWORKING, 2005, : 9 - 16
  • [28] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423
  • [29] Towards a New User Anonymity Preserving Protocol (APP) for MANETs
    Nadia, Chalabi
    Mhamed, Abdallah
    Belhadri, Messabih
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 243 - +
  • [30] A secure identification and key agreement protocol with user anonymity (SIKA)
    Mangipudi, Kumar
    Katti, Rajendra
    COMPUTERS & SECURITY, 2006, 25 (06) : 420 - 425