Download presentation
Presentation is loading. Please wait.
Published byChastity Townsend Modified over 6 years ago
1
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks
Source: Wireless Personal Communications, ahead of print, online 19 May 2017 Author: Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit Goswami Speaker: Nguyen Ngoc Tu Date: 2017/06/15 Green: environmentally friendly
2
Introduction Scenario Internet Services
Intercept: Delete, modify, fabricate ; corrupt: clients Services
3
Motivations Zhao et al. (2014)
Vulnerable to: Known session-specific temporary information attack; Privileged-insider attack; No provision for revocation and reregistration This proposed scheme Proposed a scheme to achieve: User anonymity Resist most known attacks Intercept: Delete, modify, fabricate ; corrupt: clients Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269
4
Outline Introduction Proposed scheme Conclusions Comments
5
Proposed scheme: Outline
(1) Registration Registration (2) Authentication and key agreement at visited network Contribution
6
Proposed scheme (1/5) Elliptic curve: Base point: (1) Registration
Secret key: Public key: Select Compute Compute Store into Store Compute AAKE: into its database Store into
7
Proposed scheme (2/5) AKA at visited network inputs Compute Verify
AAKE:
8
Proposed scheme (3/5) AKA at visited network Select and compute
Verify Compute AAKE: Check and retrieve Verify
9
Proposed scheme (4/5) AKA at visited network Compute Retrieve Verify
AAKE: Verify Compute
10
Proposed scheme (5/5) AKA at visited network Compute Compute Verify
AAKE: Verify Session key where
11
Computation cost comparison
Performance comparison(1/3) Computation cost comparison AAKE: [42] Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269. [28] Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214–222. [26] Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487–1508.
12
Communication cost comparison
Performance comparison(2/3) Communication cost comparison AAKE: [42] Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269. [28] Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214–222. [26] Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487–1508.
13
Security requirements comparison
Performance comparison(3/3) Security requirements comparison AAKE:
14
Conclusions Secure against various known attacks
But high computational cost Automated Validation of Internet Security Protocols and Applications.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.