Identity-based roaming protocol with anonymity for heterogeneous wireless networks

The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication sc...

Full description

Saved in:
Bibliographic Details
Main Authors: JIANG Qi1, MA Jian-feng1, LI Guang-song1, LIU Hong-yue1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74646738/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850124411397472256
author JIANG Qi1
MA Jian-feng1
LI Guang-song1
LIU Hong-yue1
author_facet JIANG Qi1
MA Jian-feng1
LI Guang-song1
LIU Hong-yue1
author_sort JIANG Qi1
collection DOAJ
description The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.
format Article
id doaj-art-45c02b36f8fd4c8ab9e35190de43a045
institution OA Journals
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-45c02b36f8fd4c8ab9e35190de43a0452025-08-20T02:34:19ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-013113814574646738Identity-based roaming protocol with anonymity for heterogeneous wireless networksJIANG Qi1MA Jian-feng1LI Guang-song1LIU Hong-yue1The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.http://www.joconline.com.cn/zh/article/74646738/roamingidentity-based public key cryptographycross-domain authenticationanonymity
spellingShingle JIANG Qi1
MA Jian-feng1
LI Guang-song1
LIU Hong-yue1
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Tongxin xuebao
roaming
identity-based public key cryptography
cross-domain authentication
anonymity
title Identity-based roaming protocol with anonymity for heterogeneous wireless networks
title_full Identity-based roaming protocol with anonymity for heterogeneous wireless networks
title_fullStr Identity-based roaming protocol with anonymity for heterogeneous wireless networks
title_full_unstemmed Identity-based roaming protocol with anonymity for heterogeneous wireless networks
title_short Identity-based roaming protocol with anonymity for heterogeneous wireless networks
title_sort identity based roaming protocol with anonymity for heterogeneous wireless networks
topic roaming
identity-based public key cryptography
cross-domain authentication
anonymity
url http://www.joconline.com.cn/zh/article/74646738/
work_keys_str_mv AT jiangqi1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks
AT majianfeng1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks
AT liguangsong1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks
AT liuhongyue1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks