DocumentCode :
2544467
Title :
Security analysis of two anonymous authentication protocols for distributed wireless networks
Author :
Wong, Duncan S.
Author_Institution :
Dept. of Comput. Sci., Hong Kong City Univ., Kowloon, China
fYear :
2005
fDate :
8-12 March 2005
Firstpage :
284
Lastpage :
288
Abstract :
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribed to one network may need to access networks administered by some other operators. An anonymous authentication protocol allows a roaming mobile device to anonymously authenticate itself to a visiting network in such a way that eavesdroppers in the visiting network and operators of other networks can only tell to which network the mobile device is subscribed but cannot tell the identity of the mobile device. The protocol is useful for protecting the privacy of the roaming mobile device. In this paper, we review two anonymous authentication protocols and point out some weaknesses and flaws of them. We show that these protocols are vulnerable to some practical attacks and the anonymity of a roaming mobile device could be compromised.
Keywords :
cellular radio; data privacy; message authentication; mobile computing; radio access networks; telecommunication security; anonymous authentication protocols; distributed cellular systems; distributed wireless networks; roaming mobile device; security analysis; Access protocols; Authentication; Cellular networks; Conferences; Privacy; Protection; Roaming; Wireless application protocol; Wireless mesh networks; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on
Print_ISBN :
0-7695-2300-5
Type :
conf
DOI :
10.1109/PERCOMW.2005.70
Filename :
1392849
Link To Document :
بازگشت