Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.

Similar presentations


Presentation on theme: "A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of."— Presentation transcript:

1 A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks
Source: Wireless Personal Communications, ahead of print, online 19 May 2017 Author: Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit Goswami Speaker: Nguyen Ngoc Tu Date: 2017/06/15 Green: environmentally friendly

2 Introduction Scenario Internet Services
Intercept: Delete, modify, fabricate ; corrupt: clients Services

3 Motivations Zhao et al. (2014)
Vulnerable to: Known session-specific temporary information attack; Privileged-insider attack; No provision for revocation and reregistration This proposed scheme Proposed a scheme to achieve: User anonymity Resist most known attacks Intercept: Delete, modify, fabricate ; corrupt: clients Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269

4 Outline Introduction Proposed scheme Conclusions Comments

5 Proposed scheme: Outline
(1) Registration Registration (2) Authentication and key agreement at visited network Contribution

6 Proposed scheme (1/5) Elliptic curve: Base point: (1) Registration
Secret key: Public key: Select Compute Compute Store into Store Compute AAKE: into its database Store into

7 Proposed scheme (2/5) AKA at visited network inputs Compute Verify
AAKE:

8 Proposed scheme (3/5) AKA at visited network Select and compute
Verify Compute AAKE: Check and retrieve Verify

9 Proposed scheme (4/5) AKA at visited network Compute Retrieve Verify
AAKE: Verify Compute

10 Proposed scheme (5/5) AKA at visited network Compute Compute Verify
AAKE: Verify Session key where

11 Computation cost comparison
Performance comparison(1/3) Computation cost comparison AAKE: [42] Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269. [28] Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214–222. [26] Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487–1508.

12 Communication cost comparison
Performance comparison(2/3) Communication cost comparison AAKE: [42] Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247–269. [28] Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214–222. [26] Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487–1508.

13 Security requirements comparison
Performance comparison(3/3) Security requirements comparison AAKE:

14 Conclusions Secure against various known attacks
But high computational cost Automated Validation of Internet Security Protocols and Applications.


Download ppt "A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of."

Similar presentations


Ads by Google