Identity-based roaming protocol with anonymity for heterogeneous wireless networks
The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication sc...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2010-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/74646738/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850124411397472256 |
|---|---|
| author | JIANG Qi1 MA Jian-feng1 LI Guang-song1 LIU Hong-yue1 |
| author_facet | JIANG Qi1 MA Jian-feng1 LI Guang-song1 LIU Hong-yue1 |
| author_sort | JIANG Qi1 |
| collection | DOAJ |
| description | The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient. |
| format | Article |
| id | doaj-art-45c02b36f8fd4c8ab9e35190de43a045 |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2010-01-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-45c02b36f8fd4c8ab9e35190de43a0452025-08-20T02:34:19ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-013113814574646738Identity-based roaming protocol with anonymity for heterogeneous wireless networksJIANG Qi1MA Jian-feng1LI Guang-song1LIU Hong-yue1The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.http://www.joconline.com.cn/zh/article/74646738/roamingidentity-based public key cryptographycross-domain authenticationanonymity |
| spellingShingle | JIANG Qi1 MA Jian-feng1 LI Guang-song1 LIU Hong-yue1 Identity-based roaming protocol with anonymity for heterogeneous wireless networks Tongxin xuebao roaming identity-based public key cryptography cross-domain authentication anonymity |
| title | Identity-based roaming protocol with anonymity for heterogeneous wireless networks |
| title_full | Identity-based roaming protocol with anonymity for heterogeneous wireless networks |
| title_fullStr | Identity-based roaming protocol with anonymity for heterogeneous wireless networks |
| title_full_unstemmed | Identity-based roaming protocol with anonymity for heterogeneous wireless networks |
| title_short | Identity-based roaming protocol with anonymity for heterogeneous wireless networks |
| title_sort | identity based roaming protocol with anonymity for heterogeneous wireless networks |
| topic | roaming identity-based public key cryptography cross-domain authentication anonymity |
| url | http://www.joconline.com.cn/zh/article/74646738/ |
| work_keys_str_mv | AT jiangqi1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks AT majianfeng1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks AT liguangsong1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks AT liuhongyue1 identitybasedroamingprotocolwithanonymityforheterogeneouswirelessnetworks |