Trusted and anonymous authentication scheme for wireless networks

A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide ide...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG Li1, MA Jian-feng 1, ZHU Jian-ming 2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74649800/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537607583924224
author YANG Li1
MA Jian-feng 1
ZHU Jian-ming 2
author_facet YANG Li1
MA Jian-feng 1
ZHU Jian-ming 2
author_sort YANG Li1
collection DOAJ
description A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security.
format Article
id doaj-art-4c190a1553fa402ea512c2baba58680f
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-4c190a1553fa402ea512c2baba58680f2025-01-14T08:28:07ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130293574649800Trusted and anonymous authentication scheme for wireless networksYANG Li1MA Jian-feng 1ZHU Jian-ming 2A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme is security and reliability, it can provide identity anonymity and platform anonymity, with domain separation property and key agreement process fairness, computation costs and turns of message exchange meet the demand for wireless IP networks security.http://www.joconline.com.cn/zh/article/74649800/trusted computingwireless authentication protocolsremote attestation
spellingShingle YANG Li1
MA Jian-feng 1
ZHU Jian-ming 2
Trusted and anonymous authentication scheme for wireless networks
Tongxin xuebao
trusted computing
wireless authentication protocols
remote attestation
title Trusted and anonymous authentication scheme for wireless networks
title_full Trusted and anonymous authentication scheme for wireless networks
title_fullStr Trusted and anonymous authentication scheme for wireless networks
title_full_unstemmed Trusted and anonymous authentication scheme for wireless networks
title_short Trusted and anonymous authentication scheme for wireless networks
title_sort trusted and anonymous authentication scheme for wireless networks
topic trusted computing
wireless authentication protocols
remote attestation
url http://www.joconline.com.cn/zh/article/74649800/
work_keys_str_mv AT yangli1 trustedandanonymousauthenticationschemeforwirelessnetworks
AT majianfeng1 trustedandanonymousauthenticationschemeforwirelessnetworks
AT zhujianming2 trustedandanonymousauthenticationschemeforwirelessnetworks