Identity-based anonymous remote authentication scheme for GLOMONETS

Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study an...

Full description

Saved in:
Bibliographic Details
Main Author: Goh, Yong Rui.
Other Authors: Ma Maode
Format: Final Year Project
Language:English
Published: 2013
Subjects:
Online Access:http://hdl.handle.net/10356/54458
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-54458
record_format dspace
spelling sg-ntu-dr.10356-544582023-07-07T17:39:42Z Identity-based anonymous remote authentication scheme for GLOMONETS Goh, Yong Rui. Ma Maode School of Electrical and Electronic Engineering Infineon Technologies Asia Pacific Pte. Ltd. DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study and research of a strong authentication protocol is of intense interest recently due to the sheer popularity of communication devices that is present in our communication network today. This report will take a closer look at an authentication scheme that can be used in a category of networks defined as the Global Mobility Networks (GLOMONETS). It will attempt to explain the definition of GLOMONETS through discussing the network structure and its characteristics. Following which, this report will look specifically at an authentication scheme named Enhanced Authentication with Anonymity for Roaming Service (EAARS) proposed by other researchers in the past. Although the EAARS scheme can be effective in the authentication of different entities and also protect the communication channel to a large extent, the report will present some of the loopholes that are present in the existing scheme. To go one step further, the report will present an enhancement to the EAARS scheme by incorporating a form of asymmetric key generation named Simple Password Exponential Key Exchange (SPEKE) into the scheme. Following which, the report will evaluate the enhanced scheme by comparing it against some malicious attacks. Formal verification will also be presented in the form of a simulation using Coloured Petri Nets. Finally, the report will be concluded with some of the future work and directions that can be possible to further improve the authentication scheme. Bachelor of Engineering 2013-06-20T07:55:43Z 2013-06-20T07:55:43Z 2013 2013 Final Year Project (FYP) http://hdl.handle.net/10356/54458 en Nanyang Technological University 55 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Goh, Yong Rui.
Identity-based anonymous remote authentication scheme for GLOMONETS
description Authentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study and research of a strong authentication protocol is of intense interest recently due to the sheer popularity of communication devices that is present in our communication network today. This report will take a closer look at an authentication scheme that can be used in a category of networks defined as the Global Mobility Networks (GLOMONETS). It will attempt to explain the definition of GLOMONETS through discussing the network structure and its characteristics. Following which, this report will look specifically at an authentication scheme named Enhanced Authentication with Anonymity for Roaming Service (EAARS) proposed by other researchers in the past. Although the EAARS scheme can be effective in the authentication of different entities and also protect the communication channel to a large extent, the report will present some of the loopholes that are present in the existing scheme. To go one step further, the report will present an enhancement to the EAARS scheme by incorporating a form of asymmetric key generation named Simple Password Exponential Key Exchange (SPEKE) into the scheme. Following which, the report will evaluate the enhanced scheme by comparing it against some malicious attacks. Formal verification will also be presented in the form of a simulation using Coloured Petri Nets. Finally, the report will be concluded with some of the future work and directions that can be possible to further improve the authentication scheme.
author2 Ma Maode
author_facet Ma Maode
Goh, Yong Rui.
format Final Year Project
author Goh, Yong Rui.
author_sort Goh, Yong Rui.
title Identity-based anonymous remote authentication scheme for GLOMONETS
title_short Identity-based anonymous remote authentication scheme for GLOMONETS
title_full Identity-based anonymous remote authentication scheme for GLOMONETS
title_fullStr Identity-based anonymous remote authentication scheme for GLOMONETS
title_full_unstemmed Identity-based anonymous remote authentication scheme for GLOMONETS
title_sort identity-based anonymous remote authentication scheme for glomonets
publishDate 2013
url http://hdl.handle.net/10356/54458
_version_ 1772828482618785792