Universal authentication protocols for anonymous wireless communications

A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V and at the same time convinces V that it is a legitimate subscriber of some server H, called the home server of U. The conventional approach r...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Guomin, HUANG, Qiong, WONG, Duncan S., DENG, Xiaotie
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7434
https://ink.library.smu.edu.sg/context/sis_research/article/8437/viewcontent/Universal_authentication_protocols_for_anonymous_wireless_communications.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8437
record_format dspace
spelling sg-smu-ink.sis_research-84372022-11-02T08:32:31Z Universal authentication protocols for anonymous wireless communications YANG, Guomin HUANG, Qiong WONG, Duncan S. DENG, Xiaotie A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V and at the same time convinces V that it is a legitimate subscriber of some server H, called the home server of U. The conventional approach requires the involvement of all the three parties. In this paper, we propose a new approach which requires only two parties, U and V, to get involved. We propose two protocols: one provides better efficiency and supports user anonymity to an extent comparable to that provided by current mobile systems; and the other one achieves strong user anonymity that protects U's identity against both eavesdroppers and foreign servers and is currently the strongest notion of user anonymity defined for secure roaming. Both protocols are universal in the sense that the same protocol and signaling flows are used regardless of the domain (home or foreign) that U is visiting. This helps reducing the system complexity in practice. We also propose a practical user revocation mechanism, which is one of the most challenging problems for two-party roaming supporting strong user anonymity. Our solutions can be applied in various kinds of roaming networks such as cellular networks and interconnected wireless local area networks. 2010-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7434 info:doi/10.1109/TWC.2010.01.081219 https://ink.library.smu.edu.sg/context/sis_research/article/8437/viewcontent/Universal_authentication_protocols_for_anonymous_wireless_communications.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
YANG, Guomin
HUANG, Qiong
WONG, Duncan S.
DENG, Xiaotie
Universal authentication protocols for anonymous wireless communications
description A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V and at the same time convinces V that it is a legitimate subscriber of some server H, called the home server of U. The conventional approach requires the involvement of all the three parties. In this paper, we propose a new approach which requires only two parties, U and V, to get involved. We propose two protocols: one provides better efficiency and supports user anonymity to an extent comparable to that provided by current mobile systems; and the other one achieves strong user anonymity that protects U's identity against both eavesdroppers and foreign servers and is currently the strongest notion of user anonymity defined for secure roaming. Both protocols are universal in the sense that the same protocol and signaling flows are used regardless of the domain (home or foreign) that U is visiting. This helps reducing the system complexity in practice. We also propose a practical user revocation mechanism, which is one of the most challenging problems for two-party roaming supporting strong user anonymity. Our solutions can be applied in various kinds of roaming networks such as cellular networks and interconnected wireless local area networks.
format text
author YANG, Guomin
HUANG, Qiong
WONG, Duncan S.
DENG, Xiaotie
author_facet YANG, Guomin
HUANG, Qiong
WONG, Duncan S.
DENG, Xiaotie
author_sort YANG, Guomin
title Universal authentication protocols for anonymous wireless communications
title_short Universal authentication protocols for anonymous wireless communications
title_full Universal authentication protocols for anonymous wireless communications
title_fullStr Universal authentication protocols for anonymous wireless communications
title_full_unstemmed Universal authentication protocols for anonymous wireless communications
title_sort universal authentication protocols for anonymous wireless communications
publisher Institutional Knowledge at Singapore Management University
publishDate 2010
url https://ink.library.smu.edu.sg/sis_research/7434
https://ink.library.smu.edu.sg/context/sis_research/article/8437/viewcontent/Universal_authentication_protocols_for_anonymous_wireless_communications.pdf
_version_ 1770576339023167488