• DocumentCode
    58012
  • Title

    Efficient Privacy-Preserving Authentication in Wireless Mobile Networks

  • Author

    Hyo Jin Jo ; Jung Ha Paik ; Dong Hoon Lee

  • Author_Institution
    Center for Inf. Security, Korea Univ., Seoul, South Korea
  • Volume
    13
  • Issue
    7
  • fYear
    2014
  • fDate
    Jul-14
  • Firstpage
    1469
  • Lastpage
    1481
  • Abstract
    Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of users, there have been researches on anonymous authentication. In particular, anonymous authentication without the participation of home servers has attracted considerable interest owing to its influence on the communication efficiency. Unfortunately, the previously proposed anonymous authentication schemes have serious practical shortcomings, such as high communication and computation costs and huge revocation lists. In this paper, we propose a novel three-round anonymous roaming protocol that does not require the participation of home servers. The proposed protocol uses a pseudo-identity-based signcryption scheme to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the number of pseudo-identities stored in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols. The proposed protocol is formally proved in the Canetti-Krawczyk (CK) model.
  • Keywords
    cryptographic protocols; mobile radio; telecommunication security; Canetti-Krawczyk model; SIM card; authentication efficiency; communication efficiency; home servers; location privacy; privacy-preserving authentication; pseudo-identity-based signcryption scheme; revocation; secure authentication; signcryption algorithm; storage capacity; subscriber identification module; three-round anonymous roaming protocol; wireless mobile networks; wireless network services; Authentication; Mobile computing; Privacy; Protocols; Roaming; Servers; Algorithm/protocol design and analysis; Anonymity; Canetti-Krawczyk (CK) model; Network Protocols; Network-level security and protection; authentication; privacy; revocation; secure roaming;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2013.134
  • Filename
    6636293