Because of the popularity of wireless communication technologies, people can access
servers without the restriction of place and time. With the rapid development of
mobile devices, such as smart phones and iPads, the frequency of wireless networks
have increased. Roaming services ensure service provision without location constraints.
A secure roaming authentication protocol is critical for the security and
privacy of users when accessing services by roaming. It ensures the authenticity
of mobile users, and foreign and home servers. After authentication, the session
key for the mobile user and the foreign server is established for secure communication.
In addition, a secure roaming protocol may provide anonymity for mobile
users. When the mobile user requests a service, the server is unable to identify two
requests from the same user. For the current anonymous authentication protocols,
the foreign server must fulfill the revocation check by the computation linear to the
number of revoked users. It makes the protocol infeasible in practical environments.
This thesis proposes a strong anonymous authentication protocol, using two-stage
authentication, in which the home server is involved in the initial authentication
to eliminate the revocation list and issues a timely anonymous credential for subsequent
authentication after successful authentication. It reduces the computation
costs for the revocation check and minimizes the size of the revocation list. Finally,
this thesis also provides security proofs and comparisons of the proposed authentication
mechanism.
Identifer | oai:union.ndltd.org:NSYSU/oai:NSYSU:etd-0830112-142803 |
Date | 30 August 2012 |
Creators | Tong, Yi-Wen |
Contributors | Chi-Yao Weng, Shi-Ming Huang, D.J. Guan, Chun-I Fan, Wei-Zhe Sun |
Publisher | NSYSU |
Source Sets | NSYSU Electronic Thesis and Dissertation Archive |
Language | English |
Detected Language | English |
Type | text |
Format | application/pdf |
Source | http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830112-142803 |
Rights | user_define, Copyright information available at source archive |
Page generated in 0.0017 seconds