Protocols for purpose-restricted anonymous communications in IP-based wireless networks

被引:4
|
作者
Fathi, Hanane [1 ]
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Res Ctr Informat Secur, Natl Inst Adv Ind Sci & Technol, Chiyoda Ku, Tokyo 1010021, Japan
[2] Chuo Univ, Bunkyo Ku, Tokyo 1128551, Japan
关键词
Anonymous communication; Sender anonymity; Anonymous authentication; Password-based authenticated key exchange; IP address assignment;
D O I
10.1016/j.comcom.2008.06.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications (e.g. net counselling and whistle blowing). On the other hand, anonymity may be abused for various malicious activities (e.g. redistribution of copyrighted contents and illegal drug trading). In this paper, we address both by proposing protocols for authenticated anonymous communications channels. In such channels, the client can authenticate the authentication server while the latter can only authenticate the fact that the client is one of the qualified members that are eligible to use the wireless network (e.g. WLAN hot spots, WiMAX). Our protocols are based on an efficient anonymous password-based authenticated key exchange protocol and on an anonymous IP address assignment. The proposed protocols have the following advantages: (1) they can restrict the usage of the established anonymous channels to certain fair purposes; (2) they do not involve rerouting of the packets through a chain of intermediate nodes; (3) they are available right after registration of a normal password to an authentication server as for a classical non-anonymous authentication (e.g. EAP-TTLS and PEAP) and do not require any special registration procedures that would reveal initially to the authentication server that the client belongs to a small list of users of anonymous services. However, each scheme has different features with respect to the changes required of the DHCP standard, the controlled and adaptive IP address assignment, the compatibility to authentication frameworks used for wireless networks, the scalability and the number of messages involved. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:3662 / 3671
页数:10
相关论文
共 50 条
  • [1] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Hanane Fathi
    SeongHan Shin
    Kazukuni Kobara
    Hideki Imai
    [J]. Wireless Personal Communications, 2010, 54 : 225 - 236
  • [2] Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems
    Fathi, Hanane
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 54 (01) : 225 - 236
  • [3] Application signaling protocols as basis for QoS in IP-based wireless networks
    Daher, R
    Tavangarian, D
    Malekpour, A
    [J]. INNOVATIVE INTERNET COMMUNITY SYSTEMS, 2006, 3908 : 171 - 180
  • [4] IP-based protocols in cellular networks and mobility management
    Khan, MA
    Nazir, SS
    [J]. ISCON 2002: IEEE STUDENTS CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2002, : 40 - 47
  • [5] Transition mechanism in IP-based wireless networks
    Thakolsri, S
    Prehofer, C
    Kellerer, W
    [J]. 2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2004, : 112 - 119
  • [6] Dynamic partitioning of IP-based wireless access networks
    Barkoosaraei, A. Mirsayar
    Aghvami, A. Hamid
    [J]. COMPUTER NETWORKS, 2013, 57 (01) : 134 - 146
  • [7] Mobility Management in IP-based Wireless Sensor Networks
    Camilo, T.
    Pinto, P.
    Rodrigues, A.
    Silva, J. Sa
    Boavida, F.
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 96 - 103
  • [8] Key management in IP-based mobile and wireless networks
    Chang, CC
    [J]. PDPTA '05: Proceedings of the 2005 International Conference on Parallel and Distributed Processing Techniques and Applications, Vols 1-3, 2005, : 1129 - 1134
  • [9] Architecture and protocols in an IP-based integrated terrestrial/satellite mobile communications network
    Fan, L
    Woodward, ME
    Gardiner, JG
    [J]. 2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, 2001, : 2850 - 2854
  • [10] Universal Authentication Protocols for Anonymous Wireless Communications
    Yang, Guomin
    Huang, Qiong
    Wong, Duncan S.
    Deng, Xiaotie
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (01) : 168 - 174