Mobile IP registration protocol with user anonymity

被引:0
|
作者
Dang, Lan-Jun [1 ]
Kou, Wei-Dong [1 ,2 ]
Cao, Xue-Fei [1 ]
Fan, Kai [1 ]
机构
[1] State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China
[2] IBM, Beijing 100027, China
关键词
Authentication; -; Calculations;
D O I
暂无
中图分类号
学科分类号
摘要
In order to address the anonymous authentication problem in mobile IP registration, a mobile IP registration protocol with user anonymity is proposed. To construct its temporary identity (TID) in the registration request message, the mobile node (MN) hashes the home agent (HA)'s identity together with a newly established Diffie-Hellman key and performs a bitwise XOR over the MN's real identity and the hashed value. Then HA recalculates the hash value and XORs it with the received TID to derive the MN's true identity. The user anonymity and untractability are achieved in the proposed protocol by the TID, which varies with each registration. Theoretical analysis demonstrates that the proposed protocol accomplishes both strong anonymity and mutual authentication among three mobile IP entities. Compared to the anonymous wireless authentication protocol proposed by Peng et al., the proposed protocol reduces the computation load at the MN.
引用
下载
收藏
页码:282 / 287
相关论文
共 50 条
  • [41] Cryptanalysis and Improvement of a WTLS Handshake Protocol with User Anonymity and Forward Secrecy
    Cui, Yuanyuan
    Zhou, Yongbin
    Feng, Dengguo
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 328 - 331
  • [42] Mobile IP registration protocol: A security attack and new secure minimal public-key based authentication
    Sufatrio
    Lam, KY
    FOURTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN'99), PROCEEDINGS, 1999, : 364 - 369
  • [44] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Ruhul Amin
    G. P. Biswas
    Journal of Medical Systems, 2015, 39
  • [45] Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication
    Natl Univ of Singapore, Singapore
    Int Symp Parall Archit Algorithms Networks I SPAN, (364-369):
  • [46] A Key Agreement Protocol Providing User Anonymity in Wireless Sensor Networks
    Choi, Gun-Wook
    Lee, Im-Yeong
    ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 10431 - 10435
  • [47] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [48] A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity
    Chain, Kai
    Kuo, Wen-Chung
    Cheng, Jiin-Chiou
    APPLIED SCIENCES-BASEL, 2016, 6 (12):
  • [49] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
    Yang, Xu
    Huang, Xinyi
    Liu, Joseph K.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
  • [50] A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity
    Amin, Ruhul
    Biswas, G. P.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)