A Self-certified Mechanism for Mutual Authentication and Key Exchange in Roaming Services

نویسنده

  • RENYI XIAO
چکیده

In this paper, a novel mutual authentication and key exchange protocol based on self-certified mechanism is proposed for roaming services in the global mobility network (GLOMONET). The main new features of the proposed protocol include identity anonymity, one-time session key renewal, and distributed security management scheme. Identity anonymity protects location privacy of mobile users in the roaming network environment. One-time session key renewal protocol frequently updates the session key for mobile users and hence reduces the risk of using a compromised session key to communicate with visited networks. The distributed security management scheme provides an efficient management mechanism: the original security manager in home network is responsible for providing local services for his mobile user whilst a temporary security manager dynamically generated for a roaming user in the visited network is in charge of providing roaming services. After certification, the temporary security manager will take the place of the original security manager when the roaming user stays in the service area of the visited network. The results of performance analysis show that the computation complexity of our protocol is not high and does satisfy the computation capacity requirement for mobile device while these new security features have been significantly enhanced. Keywords—Authentication, key exchange, roaming service, anonymity, self-certified.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services

Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network (GLOMONET). The proposed protocols have new features, such as identity anonymity and one-time session key progression. Identity anonymity protects mobile users’ privacy in the roaming network environment. One-time session key progression frequentl...

متن کامل

Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mobile networks. For personal privacy, it becomes an important is...

متن کامل

Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication

The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

An Improved Anonymous Authentication Scheme for Roaming Services

In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006