A Study of Authentication Schemes with User Anonymity for Wireless Networks

碩士 === 國立暨南國際大學 === 資訊管理學系 === 94 === The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. In 2004, Zhu and Ma proposed an authentication scheme with user anonymity based on...

Full description

Bibliographic Details
Main Authors: Shu-Chuan Chuang, 莊淑娟
Other Authors: Yen-Cheng Chen
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/75052146951548293592
id ndltd-TW-094NCNU0396027
record_format oai_dc
spelling ndltd-TW-094NCNU03960272015-10-13T10:34:47Z http://ndltd.ncl.edu.tw/handle/75052146951548293592 A Study of Authentication Schemes with User Anonymity for Wireless Networks 在無線網路上具匿名性的身份認證機制之研究 Shu-Chuan Chuang 莊淑娟 碩士 國立暨南國際大學 資訊管理學系 94 The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. In 2004, Zhu and Ma proposed an authentication scheme with user anonymity based on the use of a one-way hash function and smart cards. Recently, Yang et al. also proposed a secure and efficient authentication protocol for anonymous channels in wireless systems without employing asymmetric cryptosystems. In this thesis, we will show that Zhu-Ma’s scheme fails to preserve user anonymity. We also find that Yang et al.’s scheme is vulnerable to guessing attacks performed by malicious visited networks. Via the proposed guessing attack, the secret keys of users may be revealed to visited networks. We will further propose a new practical authentication scheme preserving the same merits of their scheme. The proposed scheme has additional merits including: no verification table in the home network, free of time synchronization between mobile stations and visited networks, and without obsolete anonymous tickets left in visited networks. The proposed scheme is developed based on a secure one-way hash function and simple operations. The soundness of the authentication protocol is proved by using VO logic. Yen-Cheng Chen 陳彥錚 2006 學位論文 ; thesis 62 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立暨南國際大學 === 資訊管理學系 === 94 === The use of anonymous channel tickets was proposed for authentication in wireless environments to provide user anonymity and to probably reduce the overhead of re-authentications. In 2004, Zhu and Ma proposed an authentication scheme with user anonymity based on the use of a one-way hash function and smart cards. Recently, Yang et al. also proposed a secure and efficient authentication protocol for anonymous channels in wireless systems without employing asymmetric cryptosystems. In this thesis, we will show that Zhu-Ma’s scheme fails to preserve user anonymity. We also find that Yang et al.’s scheme is vulnerable to guessing attacks performed by malicious visited networks. Via the proposed guessing attack, the secret keys of users may be revealed to visited networks. We will further propose a new practical authentication scheme preserving the same merits of their scheme. The proposed scheme has additional merits including: no verification table in the home network, free of time synchronization between mobile stations and visited networks, and without obsolete anonymous tickets left in visited networks. The proposed scheme is developed based on a secure one-way hash function and simple operations. The soundness of the authentication protocol is proved by using VO logic.
author2 Yen-Cheng Chen
author_facet Yen-Cheng Chen
Shu-Chuan Chuang
莊淑娟
author Shu-Chuan Chuang
莊淑娟
spellingShingle Shu-Chuan Chuang
莊淑娟
A Study of Authentication Schemes with User Anonymity for Wireless Networks
author_sort Shu-Chuan Chuang
title A Study of Authentication Schemes with User Anonymity for Wireless Networks
title_short A Study of Authentication Schemes with User Anonymity for Wireless Networks
title_full A Study of Authentication Schemes with User Anonymity for Wireless Networks
title_fullStr A Study of Authentication Schemes with User Anonymity for Wireless Networks
title_full_unstemmed A Study of Authentication Schemes with User Anonymity for Wireless Networks
title_sort study of authentication schemes with user anonymity for wireless networks
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/75052146951548293592
work_keys_str_mv AT shuchuanchuang astudyofauthenticationschemeswithuseranonymityforwirelessnetworks
AT zhuāngshūjuān astudyofauthenticationschemeswithuseranonymityforwirelessnetworks
AT shuchuanchuang zàiwúxiànwǎnglùshàngjùnìmíngxìngdeshēnfènrènzhèngjīzhìzhīyánjiū
AT zhuāngshūjuān zàiwúxiànwǎnglùshàngjùnìmíngxìngdeshēnfènrènzhèngjīzhìzhīyánjiū
AT shuchuanchuang studyofauthenticationschemeswithuseranonymityforwirelessnetworks
AT zhuāngshūjuān studyofauthenticationschemeswithuseranonymityforwirelessnetworks
_version_ 1716830268282634240