MTU CS 6461 - A New Authentication Scheme with Anonymity for Wireless Environments

Unformatted text preview:

J. Zhu and J. Ma: A New Authentication Scheme with Anonymity for Wireless Environments Contributed Paper Original manuscript received September 24, 2003 Revised manuscript received November 20, 2003 0098 3063/04/$20.00 © 2004 IEEE 231A New Authentication Scheme with Anonymity for Wireless Environments Jianming Zhu and Jianfeng Ma, Member, IEEE Abstract —Wireless network is susceptible to security attacks because its openness of transmission media. Wireless network security is somewhat more concentrated and complex than that of wired network. Authentication is the most essential procedure to ensure that the service is properly used. But its limited resource, such as weak power supplies and limited bandwidth, must be taken into account in the design of security schemes. In this paper, we present a new and efficient wireless authentication protocol providing user anonymity. Our scheme is based on the hash function and smart cards, and mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. Finally, the performance of our scheme is analyzed1. Index Terms — Anonymity, authentication, security, wireless network. I. INTRODUCTION The network security is always an important issue. Because wireless is broadcast in nature, anyone within range of a wireless device can intercept the packets being sent out without interrupting the flow of data between wireless device and base station. It is because of this that wireless network security is somewhat more concentrated than that of wired networks. Wireless communication suffers from threats inherited from wired networks and those that are specific in the wireless environment. But because of its limited resource and a higher channel error rate than wired networks, those security schemes in wired network couldn’t be used directly in wireless environment. So, the security protocols in wireless network should be designed to minimize the message sizes and the number of messages exchanged. The security features for mobile communication system include: confidentiality on the air interface, anonymity of the user and, most importantly, authentication of the user to the network in order to prevent fraudulent use of the system [1]. For the lack of a physical association between the mobile nodes (MNs) and the wired network and easy access to the radio, proper authentication is necessary to protect the communication against illegal usage and to ensure that users are connected to the network that he trusts. To provide universal wireless access to services, such authentication must 1 This work was supported by the National High Technology Research and Development Program (863 Project) under Grant No. 2002AA143021. ZHU Jianming and MA Jianfeng are with the School of Computer Xidian University, Xi’an 710071, P.R.China. (e-mail: tyzjm65@ 163.com). deal with users' roaming among areas administered by different network operators (NOs), and be implemented by users’ devices with limited computing resources. During the authentication process, some secret information must be mutually agreed upon so the following communication can proceed efficiently in protected mode to achieve desired confidentiality. In this paper, we present a simple authentication protocol providing user anonymity for wireless environments. The remainder of the paper is organized as follows: in Section 2, we review previous authentication protocols for wireless environments. A simple and efficient wireless authentication protocol is presented in Section 3. In section 4, we analyze the performances of our protocol and compare our protocol with others. Finally, a concluding remark is given in Section 5. II. REVIEW OF PREVIOUS WORKS In recent years, many authentication protocols for the wireless network have been proposed [1]-[7]. When a mobile user roaming in wireless environment, it is desirable to protect the relevant information about him. Assuring the anonymity of a mobile user prevents unintended parties from associating him with the messages to/from him or with the sessions in which he participates. The disclosure of a mobile user’s identity allows unauthorized entities to track his moving history and current location. The illegal access to any information related to users location without his notice can be a serious violation of his privacy. So, anonymity is one of importance property of these protocols. A basic solution for the provision of user anonymity is to use the temporary identity (TID) of a mobile user instead of his real one. Several security-related protocols with anonymity for wireless mobile communication systems have been proposed based on the symmetric key cryptography or the public key cryptography [1]-[7]. However, in a mobile communication system, there are a few things to consider when security protocols are being designed. First, the low computational power of mobile devices should be considered, which means a security protocol requiring heavy computation on the mobile nodes is not adequate. Secondly, wireless mobile communication networks have a lower bandwidth and a higher channel error rate than wired networks. So, the security protocols should be designed to minimize the message sizes and the number of messages exchanged. Our proposed authentication scheme is based on the public key cryptosystems, but mobile users only do symmetric encryption and decryption. In our protocol, it takes only one round of message exchange between the mobile user and the visitedIEEE Transactions on Consumer Electronics, Vol. 50, No. 1, FEBRUARY 2004 232 network, and one round of message exchange between the visited network and the corresponding home network. The most significant feature is one-time use of key between mobile user and visited network. III. PROPOSED AUTHENTICATION PROTOCOL In this section, we propose a simple and efficient authentication protocol with anonymity for wireless environment. A. The Model In wireless environments, MN indicates mobile user, HA indicates home agent of a mobile user MN, and FA indicates foreign agent of the network that a mobile user MN wants to visit. A simplified model is shown in Fig. 1, in which f indicates


View Full Document

MTU CS 6461 - A New Authentication Scheme with Anonymity for Wireless Environments

Documents in this Course
Tapestry

Tapestry

13 pages

Load more
Download A New Authentication Scheme with Anonymity for Wireless Environments
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view A New Authentication Scheme with Anonymity for Wireless Environments and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view A New Authentication Scheme with Anonymity for Wireless Environments 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?