A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS

Jing Xu, Wen-Tao Zhu, Deng-Guo Feng

2011

Abstract

The global mobility network can offer effective roaming services for a mobile wireless user between his home network and a visited network. For the sake of privacy, user anonymity has recently become an important security requirement for roaming services, and is a topic of concern in designing related protocols such as mutual authentication and key agreement. In this paper we present a generic construction, which converts any password authentication scheme based on the smart card into an anonymous authentication protocol for roaming services. Compared with the original password authentication scheme, the transformed protocol does not sacrifice authentication efficiency, and additionally, an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.

References

  1. 3rd Generation Partnership Project. (2010). Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 9). Available online at http://www.3gpp.org/ftp/Specs/htmlinfo/33102.htm.
  2. 3rd Generation Partnership Project. (2010). Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 9). Available online at http://www.3gpp.org/ftp/Specs/htmlinfo/33102.htm.
  3. Suzukiz S. and Nakada K.(1997). An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications. vol. 15, no. 8, pp. 1606-1617.
  4. Suzukiz S. and Nakada K.(1997). An authentication technique based on distributed security management for the global mobility network. IEEE Journal on Selected Areas in Communications. vol. 15, no. 8, pp. 1606-1617.
  5. Tang C. and Wu D. O.(2008). Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications. vol. 7, no. 3, pp. 1035-1042.
  6. Tang C. and Wu D. O.(2008). Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications. vol. 7, no. 3, pp. 1035-1042.
  7. Yang G., Wong D. S., and Deng X.(2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications. vol. 6, no. 9, pp. 3461-3472.
  8. Yang G., Wong D. S., and Deng X.(2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications. vol. 6, no. 9, pp. 3461-3472.
  9. Wan Z. G., Ren K., and Preneel B.(2008). A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. In: 1st ACM Conference on Wireless Network Security (WiSec 2008). pp. 62-67.
  10. Wan Z. G., Ren K., and Preneel B.(2008). A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. In: 1st ACM Conference on Wireless Network Security (WiSec 2008). pp. 62-67.
  11. He Q., Wu D., and Khosla P.(2004). Quest for personal control over mobile location privacy. IEEE Communications Magazine. vol. 42, no. 5, pp. 130-136.
  12. He Q., Wu D., and Khosla P.(2004). Quest for personal control over mobile location privacy. IEEE Communications Magazine. vol. 42, no. 5, pp. 130-136.
  13. Tzeng W.-G.(2006). A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006). pp. 223-230.
  14. Tzeng W.-G.(2006). A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006). pp. 223-230.
  15. Xu J., Zhu W.-T., and Feng D.-G.(2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces. vol. 31, no.4, pp.723-728.
  16. Xu J., Zhu W.-T., and Feng D.-G.(2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces. vol. 31, no.4, pp.723-728.
Download


Paper Citation


in Harvard Style

Xu J., Zhu W. and Feng D. (2011). A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 269-274. DOI: 10.5220/0003511202690274


in Harvard Style

Xu J., Zhu W. and Feng D. (2011). A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 269-274. DOI: 10.5220/0003511202690274


in Bibtex Style

@conference{secrypt11,
author={Jing Xu and Wen-Tao Zhu and Deng-Guo Feng},
title={A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={269-274},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003511202690274},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Jing Xu and Wen-Tao Zhu and Deng-Guo Feng},
title={A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={269-274},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003511202690274},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS
SN - 978-989-8425-71-3
AU - Xu J.
AU - Zhu W.
AU - Feng D.
PY - 2011
SP - 269
EP - 274
DO - 10.5220/0003511202690274


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS
SN - 978-989-8425-71-3
AU - Xu J.
AU - Zhu W.
AU - Feng D.
PY - 2011
SP - 269
EP - 274
DO - 10.5220/0003511202690274