Secure Anonymous Authentication Scheme with Roaming Used in Mobile Devices

碩士 === 南台科技大學 === 資訊工程系 === 101 === Following the fast development of Internet, more network services are raised. For convenience, most network accesses are achieved through wireless network. However, such wireless network transmissions are inclined to suffer from the intercepting attack and their p...

Full description

Bibliographic Details
Main Authors: Hong-Ji Wei, 魏宏吉
Other Authors: Jiin-Chiou Cheng
Format: Others
Language:zh-TW
Published: 102
Online Access:http://ndltd.ncl.edu.tw/handle/19804334459108987019
Description
Summary:碩士 === 南台科技大學 === 資訊工程系 === 101 === Following the fast development of Internet, more network services are raised. For convenience, most network accesses are achieved through wireless network. However, such wireless network transmissions are inclined to suffer from the intercepting attack and their personal privacy would be exposed. In order to protect the privacy of data, many scholars propose many kinds of anonymous roaming network authentication protocols, which cited some existing cryptographic technology to achieve overall security, such as public key cryptography, private key cryptography, time stamp, and so on. These existing technologies can indeed increase the security of protocol, but the amount of the operation in the protocol will increase relatively. This thesis begins with the analysis of the protocols proposed by Wu et al. and Kim et al., and points out their security weaknesses. Simultaneously, two modified protocols have been proposed to improve their weaknesses in this thesis. We make the comparison and analysis in aspects of security to prove our modified protocols prior to previous ones. Finally, based on performance and security considerations, this thesis further suggests a novel anonymous roaming authentication protocols applied to mobility network. From the analysis of security and efficiency, it can prove that our proposed scheme can not only improve overall effectiveness, but also provide complete security (including anonymity, untraceability, and so on) to protect user's private data against hacker's stealing.