首页> 外文期刊>International journal of communication systems >Efficient privacy-preserving authentication scheme for roaming consumer in global mobility networks
【24h】

Efficient privacy-preserving authentication scheme for roaming consumer in global mobility networks

机译:全球移动网络中漫游消费者的高效保护验证方案

获取原文
获取原文并翻译 | 示例
           

摘要

The advancements in wireless technologies have paved the way for offering seamless services to mobile consumers in global mobility networks (GLOMONETs). Nonetheless, since in these networks, the communication channels are open and public, devising proper measures to protect the security and privacy of exchanging messages is critical. Moreover, because of the energy and computational power limitations of the mobile devices, a security mechanism should put the least possible burden on these devices. To do so, plenty authentication schemes have been proposed in recent years to be employed in the context of GLOMONETs. Quite recently, four interesting authentication and key agreement schemes have been put forward, which have improved the efficiency and security of their previous related schemes. Besides the nice contributions of these four, in this paper, it is first indicated that all of them are vulnerable to the known session-specific information attack. Then, a new chaotic map-based authentication scheme is presented that not only is secure against the aforementioned attack but also has less computational complexity and communication overhead. The comprehensive descriptive discussion on security alongside the formal verification of security using the widely accepted ProVerif tool show that our scheme is secure against the known attacks, and the comparative performance analysis demonstrates its betterment for the constrained-resource mobile devices.
机译:无线技术的进步已经为全球移动网络(GloMonets)提供了向移动消费者提供无缝服务的方式。尽管如此,由于在这些网络中,通信频道是开放和公众的,设计了适当的措施来保护交换消息的安全性和隐私至关重要。此外,由于移动设备的能量和计算功率限制,安全机制应该​​在这些设备上施加最少的负担。为此,近年来已经提出了近年来在手中的上下文中进行了认证方案。最近,已经提出了四个有趣的认证和关键协议计划,这提高了他们以前的相关方案的效率和安全性。除了这四个的良好贡献外,在本文中,首先表示所有这些都容易受到已知的会议特定信息攻击的影响。然后,提出了一种新的混沌地图的认证方案,其不仅是对上述攻击的安全性,而且还具有较少的计算复杂性和通信开销。关于安全性的全面描述性讨论以及使用广泛接受的纤维工具的正式验证安全性显示我们的方案对已知攻击的安全性,并且比较性能分析表明其对受限资源移动设备的改善。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号