Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments

碩士 === 南台科技大學 === 資訊工程系 === 101 === Due to the rapid development of wireless networks, mobile phone users has also led to anonymous connections to the domestic telecommunications companies through foreign telecom companies abroad, and the purpose of the wireless Internet access and charges. In 2009,...

Full description

Bibliographic Details
Main Authors: Ruei-Cyun Ye, 葉瑞羣
Other Authors: Jiin-Chiou Cheng
Format: Others
Language:zh-TW
Published: 102
Online Access:http://ndltd.ncl.edu.tw/handle/53456997694780672867
id ndltd-TW-101STUT8392003
record_format oai_dc
spelling ndltd-TW-101STUT83920032016-11-22T04:13:42Z http://ndltd.ncl.edu.tw/handle/53456997694780672867 Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments 植基於橢圓曲線的手機無線漫遊匿名 驗證機制 Ruei-Cyun Ye 葉瑞羣 碩士 南台科技大學 資訊工程系 101 Due to the rapid development of wireless networks, mobile phone users has also led to anonymous connections to the domestic telecommunications companies through foreign telecom companies abroad, and the purpose of the wireless Internet access and charges. In 2009, Chang and Lee proposed an enhanced authentication scheme with anonymity for roaming service in global mobility networks. Although Chang and Lee’s scheme can prevent the forgery attack and defense the damage of the smart card loss, IDHA without being encrypted will suffer from hacking when it is transferred twice in the phase of authentiaction. And then DoS attack will be fired up against the specific FA and HA by replay the IDHA. Besides, Chang and Lee’s scheme only mentions the session key establishment and authentication. In 2012, Lee proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications, although the agreement has been security analysis and discussion, but in the validation phase attacker can intercept IDHA, through the means of replay attacks, the session key corresponding to the specific object of the FA and HA denial of service attacks, Its anonymous level only C2, as well as roaming stage evaded problem deeply explore. In 2012, Ye et al proposed wireless phone roaming based on elliptic curve anonymous login scheme, able to solve the Although the protocol has been security analysis in the authentication phase can be achieved C3 Anonymous phase, as well as roaming phase corresponding to the session key issues, but in the authentication phase FA between MU, FA and HA have not validated the action, so the FA is like a relay station, and was forced to accept the message sent over the MU and HA, then help sent to the address specified in addition to it sin-depth discussion at the the roaming of session key ski next session key ski+1, detailed calculations are not done. To overcome the problem, it is proposed in this paper an based on elliptic curve mobile roaming authentication scheme with anonymity for wireless environments, In addition to retain the original security, security analysis BAN-logic to prove the security of our proposed scheme, to have real security, efficiency and high anonymity and integrity. Jiin-Chiou Cheng 鄭錦楸 102 學位論文 ; thesis 52 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 南台科技大學 === 資訊工程系 === 101 === Due to the rapid development of wireless networks, mobile phone users has also led to anonymous connections to the domestic telecommunications companies through foreign telecom companies abroad, and the purpose of the wireless Internet access and charges. In 2009, Chang and Lee proposed an enhanced authentication scheme with anonymity for roaming service in global mobility networks. Although Chang and Lee’s scheme can prevent the forgery attack and defense the damage of the smart card loss, IDHA without being encrypted will suffer from hacking when it is transferred twice in the phase of authentiaction. And then DoS attack will be fired up against the specific FA and HA by replay the IDHA. Besides, Chang and Lee’s scheme only mentions the session key establishment and authentication. In 2012, Lee proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications, although the agreement has been security analysis and discussion, but in the validation phase attacker can intercept IDHA, through the means of replay attacks, the session key corresponding to the specific object of the FA and HA denial of service attacks, Its anonymous level only C2, as well as roaming stage evaded problem deeply explore. In 2012, Ye et al proposed wireless phone roaming based on elliptic curve anonymous login scheme, able to solve the Although the protocol has been security analysis in the authentication phase can be achieved C3 Anonymous phase, as well as roaming phase corresponding to the session key issues, but in the authentication phase FA between MU, FA and HA have not validated the action, so the FA is like a relay station, and was forced to accept the message sent over the MU and HA, then help sent to the address specified in addition to it sin-depth discussion at the the roaming of session key ski next session key ski+1, detailed calculations are not done. To overcome the problem, it is proposed in this paper an based on elliptic curve mobile roaming authentication scheme with anonymity for wireless environments, In addition to retain the original security, security analysis BAN-logic to prove the security of our proposed scheme, to have real security, efficiency and high anonymity and integrity.
author2 Jiin-Chiou Cheng
author_facet Jiin-Chiou Cheng
Ruei-Cyun Ye
葉瑞羣
author Ruei-Cyun Ye
葉瑞羣
spellingShingle Ruei-Cyun Ye
葉瑞羣
Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments
author_sort Ruei-Cyun Ye
title Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments
title_short Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments
title_full Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments
title_fullStr Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments
title_full_unstemmed Based on Elliptic Curve Mobile Roaming Authentication Scheme with Anonymity for Wireless Environments
title_sort based on elliptic curve mobile roaming authentication scheme with anonymity for wireless environments
publishDate 102
url http://ndltd.ncl.edu.tw/handle/53456997694780672867
work_keys_str_mv AT rueicyunye basedonellipticcurvemobileroamingauthenticationschemewithanonymityforwirelessenvironments
AT yèruìqún basedonellipticcurvemobileroamingauthenticationschemewithanonymityforwirelessenvironments
AT rueicyunye zhíjīyútuǒyuánqūxiàndeshǒujīwúxiànmànyóunìmíngyànzhèngjīzhì
AT yèruìqún zhíjīyútuǒyuánqūxiàndeshǒujīwúxiànmànyóunìmíngyànzhèngjīzhì
_version_ 1718397751273717760