Presentation is loading. Please wait.

Presentation is loading. Please wait.

SPEAKER: HONG-JI WEI DATE: 2013-03-06 Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.

Similar presentations


Presentation on theme: "SPEAKER: HONG-JI WEI DATE: 2013-03-06 Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks."— Presentation transcript:

1 SPEAKER: HONG-JI WEI DATE: 2013-03-06 Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks

2 Outline 1 1. Introduction 2. Hong-Ji’s Scheme 3. Security Analysis 4. Conclusions

3 1. Introduction (1/2) 2 In recent years, many authors proposed anonymous authentication scheme with roaming for mobile networks. For security considerations, they used many ways to protect users from attack such as encryption, timestamp. Because computational ability of mobile devices is not very well, it must spend a long time to calculate when it receive the encrypted messages.

4 1. Introduction (2/2) 3 For the reasons above, we proposed a more efficient and secure anonymous authentication scheme with roaming used in mobile networks in this paper. The scheme in this paper not only can provide perfect security, but also improve the performance efficiently.

5 2. Hong-Ji's Scheme (1/5) 4 Notations of Hong-Ji's scheme MUMobile User FAForeign Agent HAHome Agent PW X Password of an entity X ID X Identity of an entity X h(.)One-way hash function NXNX Random nonce of an entity X ⊕ Exclusive OR operation ||Concatenation operation PA point on the elliptic curve E p (a,b) PXPX Secret key of an entity X

6 5 This scheme consists of three main phases 1. Registration 2. Authentication and key establishment 3. Update session key 2. Hong-Ji's Scheme (2/5)

7 6 Registration 2. Hong-Ji's Scheme (3/5) MUHA Secure Channel

8 7 Authentication and key establishment 2. Hong-Ji's Scheme (4/5) MUFAHA

9 8 Update session key 2. Hong-Ji's Scheme (5/5) MUFA

10 3. Security Analysis (1/9) 9 Achieve anonymity of users MUFAHA

11 10 Protect secrecy of session key MUFAHA 3. Security Analysis (2/9)

12 11 Protect secrecy of session key 3. Security Analysis (3/9) MUFA

13 12 3. Security Analysis (4/9) Prevent the replay attack MUFAHA

14 13 Prevent the replay attack 3. Security Analysis (5/9) MUFA

15 14 Prevent the man-in-the-middle attack 3. Security Analysis (6/9) MUFAHA

16 15 Mutual authentication between MU and HA 3. Security Analysis (7/9) MUFAHA

17 16 3. Security Analysis (8/9) Mutual authentication between FA and HA MUFAHA

18 17 3. Security Analysis (9/9) Mutual authentication between MU and FA MUFAHA

19 4. Conclusions (1/1) 18 In this paper, we propose an efficient and secure anonymous authentication scheme to overcome the bottleneck of efficiency of mobile devices. Our proposed scheme is very suitable for mobile devices because it don not use any complex calculation such as symmetric and asymmetric encryption. From our security analysis, it can prove that our proposed scheme can achieve these security efficiently.


Download ppt "SPEAKER: HONG-JI WEI DATE: 2013-03-06 Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks."

Similar presentations


Ads by Google