Anonymous roaming authentication protocol for wireless network with backward unlinkability and natural revocation

被引:0
|
作者
Mohit Gupta
Narendra S. Chaudhari
机构
[1] VNIT,Department of Computer Science, Engineering
来源
关键词
Anonymous; Untraceability; Authentication; Roaming; Revocation; Wireless network;
D O I
暂无
中图分类号
学科分类号
摘要
An anonymous secure roaming authentication protocol can be used in wireless network for authentication between a mobile device and a foreign server when the mobile device is away from its home network and wants to use the services of the foreign network. In a two-party roaming authentication protocol, a mobile user and a foreign server authenticate each other without the active help of the home server. Group signature-based protocols are the obvious choice for the design of two-party protocol due to inherent anonymous nature of group signature. Among the existing group signature-based roaming authentication protocols, only the protocol of Liu et al. supports natural revocation without periodic updates of the master public key at the mobile user and foreign server, but it does not support backward unlinkability. Therefore, we propose a two-party anonymous roaming authentication protocol in which the mobile user supports natural revocation along with backward unlinkability without periodic updates of either public key or private key. In addition, the proposed protocol is provably secure in the random oracle model.
引用
收藏
页码:175 / 184
页数:9
相关论文
共 50 条
  • [21] An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
    Sen, Jaydip
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 580 - 592
  • [22] An enhanced anonymous authentication protocol for wireless sensor networks
    Li, Jiping
    Yu, Tong
    Wu, Yunyun
    Kong, Xia
    Liu, Shouyin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 35 (03) : 136 - 149
  • [23] An anonymous wireless authentication protocol based on proxy signature
    Jiang, Chunlin
    Jia, Weijia
    Gu, Ke
    Journal of Computational Information Systems, 2012, 8 (02): : 541 - 548
  • [24] An Anonymous Two-factor User Authentication Protocol for Hierarchical Wireless Sensor Network
    Fang W.
    Zhang W.
    Pan T.
    Gao Z.
    Ni Y.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2020, 52 (03): : 168 - 177
  • [25] A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
    R. Madhusudhan
    R. Shashidhara
    Arabian Journal for Science and Engineering, 2020, 45 : 2993 - 3014
  • [26] A Secure Anonymous Authentication Protocol for Roaming Service in Resource-Constrained Mobility Environments
    Madhusudhan, R.
    Shashidhara, R.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 2993 - 3014
  • [27] Secure Delegation-Based Authentication Protocol for Wireless Roaming Service
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (07) : 1100 - 1102
  • [28] A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS
    Wang, Yuan
    Wong, Duncan S.
    Huang, Liusheng
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [29] A secure and efficient authentication protocol for anonymous channel in wireless communications
    Yang, CC
    Tang, YL
    Wang, RC
    Yang, HW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1431 - 1439
  • [30] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243