Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems

被引:13
|
作者
Park, CS [1 ]
机构
[1] Dankook Univ, Dept Comp Sci, Cheonan 330714, South Korea
关键词
authentication; wireless; anonymity; error-correcting codes;
D O I
10.1016/j.comnet.2003.09.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A method of integrating user authentication with anonymity and untraceability is presented based on the secret-key certificate and the algebraic structure of error-correcting codes. Authentication protocol proposed here provides a means for the authentication server to avoid the requirement of maintaining a secure database of user secrets. Especially, since the proposed protocol uses a symmetric-key cryptography and eliminates the key management problem, it is efficient and convenient for both the hardware-limited users and the authentication server. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:267 / 273
页数:7
相关论文
共 50 条
  • [1] A novel wireless authentication protocol preserving user anonymity and untraceability
    Wei, Yongzhuang
    Qiu, Hongbing
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 575 - +
  • [2] Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
    Yang, Xu
    Huang, Xinyi
    Liu, Joseph K.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 190 - 195
  • [3] New authentication protocol providing user anonymity in open network
    Kim, WH
    Yoon, EJ
    Yoo, KY
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 414 - 423
  • [4] Improvement of user authentication protocol with anonymity for wireless communications
    Hu, Bin
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    [J]. KUWAIT JOURNAL OF SCIENCE, 2014, 41 (01) : 155 - 169
  • [5] An Efficient Authentication Protocol with User Anonymity for Mobile Networks
    Li, Huixian
    Yang, Yafang
    Pang, Liaojun
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1842 - 1847
  • [6] Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability
    Braeken, An
    Touhafi, Abdellah
    [J]. PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 39 - 46
  • [7] A Key Agreement Protocol Providing User Anonymity in Wireless Sensor Networks
    Choi, Gun-Wook
    Lee, Im-Yeong
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 10431 - 10435
  • [8] Cryptanalysis of park's authentication protocol in wireless mobile communication systems
    Dominguez, Alberto Peinado
    [J]. International Journal of Network Security, 2006, 3 (03) : 279 - 282
  • [9] Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6
    Alizadeh, Mojtaba
    Baharun, Sabariah
    Zamani, Mazdak
    Khodadadi, Touraj
    Darvishi, Mahdi
    Gholizadeh, Somayyeh
    Ahmadi, Hossein
    [J]. JURNAL TEKNOLOGI, 2015, 72 (05):
  • [10] An Enhanced Secure Anonymity User Authentication Protocol for Hierarchical Wireless Sensor Networks
    Pan, Tian-Yang
    Chen, Li-Quan
    Zhang, Yuan-Fang
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 632 - 635