首页> 外文会议>IEEE International Conference on Pervasive Computing and Communications Workshops >Security analysis of two anonymous authentication protocols for distributed wireless networks
【24h】

Security analysis of two anonymous authentication protocols for distributed wireless networks

机译:分布式无线网络的两个匿名认证协议的安全性分析

获取原文

摘要

In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribed to one network may need to access networks administered by some other operators. An anonymous authentication protocol allows a roaming mobile device to anonymously authenticate itself to a visiting network in such a way that eavesdroppers in the visiting network and operators of other networks can only tell to which network the mobile device is subscribed but cannot tell the identity of the mobile device. The protocol is useful for protecting the privacy of the roaming mobile device. In this paper, we review two anonymous authentication protocols and point out some weaknesses and flaws of them. We show that these protocols are vulnerable to some practical attacks and the anonymity of a roaming mobile device could be compromised.
机译:在一组分布式无线网络中,例如全局分布式蜂窝系统,可以由不同的运算符管理不同的网络。订阅到一个网络的移动设备可能需要访问由其他操作员管理的网络。匿名认证协议允许漫游移动设备匿名地将自身验证到访问网络,以这种方式,即其他网络的访问网络和运营商中的窃听者只能告诉移动设备所订阅但无法讲述身份的网络移动设备。该协议可用于保护漫游移动设备的隐私。在本文中,我们审查了两个匿名认证协议,并指出了它们的一些弱点和缺陷。我们表明这些协议容易受到一些实际攻击的影响,并且漫游移动设备的匿名可能会受到损害。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号