Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments

碩士 === 南台科技大學 === 資訊工程系 === 101 === Due to the rapid development of wireless networks, mobile phone users has also led to anonymous connections to the domestic telecommunications companies through foreign telecom companies abroad, and the purpose of the wireless Internet access and charges. In 2009,...

Full description

Bibliographic Details
Main Authors: Ruei-Cyun Ye, 葉瑞羣
Other Authors: Jiin-Chiou Cheng
Format: Others
Language:zh-TW
Published: 102
Online Access:http://ndltd.ncl.edu.tw/handle/53456997694780672867
Description
Summary:碩士 === 南台科技大學 === 資訊工程系 === 101 === Due to the rapid development of wireless networks, mobile phone users has also led to anonymous connections to the domestic telecommunications companies through foreign telecom companies abroad, and the purpose of the wireless Internet access and charges. In 2009, Chang and Lee proposed an enhanced authentication scheme with anonymity for roaming service in global mobility networks. Although Chang and Lee’s scheme can prevent the forgery attack and defense the damage of the smart card loss, IDHA without being encrypted will suffer from hacking when it is transferred twice in the phase of authentiaction. And then DoS attack will be fired up against the specific FA and HA by replay the IDHA. Besides, Chang and Lee’s scheme only mentions the session key establishment and authentication. In 2012, Lee proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications, although the agreement has been security analysis and discussion, but in the validation phase attacker can intercept IDHA, through the means of replay attacks, the session key corresponding to the specific object of the FA and HA denial of service attacks, Its anonymous level only C2, as well as roaming stage evaded problem deeply explore. In 2012, Ye et al proposed wireless phone roaming based on elliptic curve anonymous login scheme, able to solve the Although the protocol has been security analysis in the authentication phase can be achieved C3 Anonymous phase, as well as roaming phase corresponding to the session key issues, but in the authentication phase FA between MU, FA and HA have not validated the action, so the FA is like a relay station, and was forced to accept the message sent over the MU and HA, then help sent to the address specified in addition to it sin-depth discussion at the the roaming of session key ski next session key ski+1, detailed calculations are not done. To overcome the problem, it is proposed in this paper an based on elliptic curve mobile roaming authentication scheme with anonymity for wireless environments, In addition to retain the original security, security analysis BAN-logic to prove the security of our proposed scheme, to have real security, efficiency and high anonymity and integrity.