Anonymous authentication protocol for multi-services in wireless environments

被引:0
|
作者
JIANG Nan 1
机构
基金
中国国家自然科学基金;
关键词
authentication; wireless networks; trusted domain; secret splitting; hash chain;
D O I
暂无
中图分类号
TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
引用
收藏
页码:69 / 74
页数:6
相关论文
共 50 条
  • [1] Multi-services MAC protocol for wireless Networks
    Ben Othman, J.
    Castel-Taleb, H.
    Mokdad, L.
    [J]. 3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [2] Anonymous authentication with unlinkability for wireless environments
    Kun, Li
    Anna, Xiu
    Fei, He
    Lee, Dong Hoon
    [J]. IEICE ELECTRONICS EXPRESS, 2011, 8 (08): : 536 - 541
  • [3] A practical anonymous authentication protocol for wireless roaming
    Xie, Qi
    Tan, Xiao
    Wong, Duncan S.
    Wang, Guilin
    Bao, Mengjie
    Dong, Na
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (08) : 1264 - 1273
  • [4] Anonymous and Authentication Protocol for Multi-Server
    Kuo, Wen-Chung
    Shih, Po-Wei
    Huang, Yu-Chih
    Wuu, Lih-Chyau
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (02): : 235 - 245
  • [5] A Lightweight Roaming Authentication Protocol for Anonymous Wireless Communication
    Li, Xiaowei
    Zhang, Yuqing
    Liu, Xuefeng
    Cao, Jin
    Zhao, Qianqian
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1029 - 1034
  • [6] An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
    Sen, Jaydip
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 580 - 592
  • [7] An enhanced anonymous authentication protocol for wireless sensor networks
    Li, Jiping
    Yu, Tong
    Wu, Yunyun
    Kong, Xia
    Liu, Shouyin
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 35 (03) : 136 - 149
  • [8] A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
    Son, Seunghwan
    Park, Yohan
    Park, Youngho
    [J]. SUSTAINABILITY, 2021, 13 (16)
  • [9] Anonymous Authentication Scheme without Verification Table for Wireless Environments
    Isawa, Ryoichi
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (12) : 2488 - 2492
  • [10] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243