A Study of Authentication Schemes with User Anonymity for Wireless Networks
碩士 === 國立暨南國際大學 === 資訊管理學系 === 94 === The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. In 2004, Zhu and Ma proposed an authentication scheme with user anonymity based on...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/75052146951548293592 |
id |
ndltd-TW-094NCNU0396027 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094NCNU03960272015-10-13T10:34:47Z http://ndltd.ncl.edu.tw/handle/75052146951548293592 A Study of Authentication Schemes with User Anonymity for Wireless Networks 在無線網路上具匿名性的身份認證機制之研究 Shu-Chuan Chuang 莊淑娟 碩士 國立暨南國際大學 資訊管理學系 94 The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. In 2004, Zhu and Ma proposed an authentication scheme with user anonymity based on the use of a one-way hash function and smart cards. Recently, Yang et al. also proposed a secure and efficient authentication protocol for anonymous channels in wireless systems without employing asymmetric cryptosystems. In this thesis, we will show that Zhu-Ma’s scheme fails to preserve user anonymity. We also find that Yang et al.’s scheme is vulnerable to guessing attacks performed by malicious visited networks. Via the proposed guessing attack, the secret keys of users may be revealed to visited networks. We will further propose a new practical authentication scheme preserving the same merits of their scheme. The proposed scheme has additional merits including: no verification table in the home network, free of time synchronization between mobile stations and visited networks, and without obsolete anonymous tickets left in visited networks. The proposed scheme is developed based on a secure one-way hash function and simple operations. The soundness of the authentication protocol is proved by using VO logic. Yen-Cheng Chen 陳彥錚 2006 學位論文 ; thesis 62 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立暨南國際大學 === 資訊管理學系 === 94 === The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. In 2004, Zhu and Ma proposed an authentication scheme with user anonymity based on the use of a one-way hash function and smart cards. Recently, Yang et al. also proposed a secure and efficient authentication protocol for anonymous channels in wireless systems without employing asymmetric cryptosystems.
In this thesis, we will show that Zhu-Ma’s scheme fails to preserve user anonymity. We also find that Yang et al.’s scheme is vulnerable to guessing attacks performed by malicious visited networks. Via the proposed guessing attack, the secret keys of users may be revealed to visited networks. We will further propose a new practical authentication scheme preserving the same merits of their scheme. The proposed scheme has additional merits including: no verification table in the home network, free of time synchronization between mobile stations and visited networks, and without obsolete anonymous tickets left in visited networks. The proposed scheme is developed based on a secure one-way hash function and simple operations. The soundness of the authentication protocol is proved by using VO logic.
|
author2 |
Yen-Cheng Chen |
author_facet |
Yen-Cheng Chen Shu-Chuan Chuang 莊淑娟 |
author |
Shu-Chuan Chuang 莊淑娟 |
spellingShingle |
Shu-Chuan Chuang 莊淑娟 A Study of Authentication Schemes with User Anonymity for Wireless Networks |
author_sort |
Shu-Chuan Chuang |
title |
A Study of Authentication Schemes with User Anonymity for Wireless Networks |
title_short |
A Study of Authentication Schemes with User Anonymity for Wireless Networks |
title_full |
A Study of Authentication Schemes with User Anonymity for Wireless Networks |
title_fullStr |
A Study of Authentication Schemes with User Anonymity for Wireless Networks |
title_full_unstemmed |
A Study of Authentication Schemes with User Anonymity for Wireless Networks |
title_sort |
study of authentication schemes with user anonymity for wireless networks |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/75052146951548293592 |
work_keys_str_mv |
AT shuchuanchuang astudyofauthenticationschemeswithuseranonymityforwirelessnetworks AT zhuāngshūjuān astudyofauthenticationschemeswithuseranonymityforwirelessnetworks AT shuchuanchuang zàiwúxiànwǎnglùshàngjùnìmíngxìngdeshēnfènrènzhèngjīzhìzhīyánjiū AT zhuāngshūjuān zàiwúxiànwǎnglùshàngjùnìmíngxìngdeshēnfènrènzhèngjīzhìzhīyánjiū AT shuchuanchuang studyofauthenticationschemeswithuseranonymityforwirelessnetworks AT zhuāngshūjuān studyofauthenticationschemeswithuseranonymityforwirelessnetworks |
_version_ |
1716830268282634240 |