EFFICIENT DELEGATION-BASED AUTHENTICATION PROTOCOL WITH STRONG MOBILE PRIVACY

Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou

Abstract

In 2008, Tang and Wu designed a one-time alias mechanism for protecting the mobile privacy of a user. Recently, Youn and Lim proposed an improved delegation-based authentication protocol to provide private roaming service. In this article, we show that a link between requests may disclose information about the mobile privacy of a sender, and that the aliases of a user fail to achieve the unlinkability in Tan-Wu’s scheme. We remedy this situation by suggesting an enhanced protocol that utilizes a pseudorandom function. Compared to Youn-Lim’s protocol, our design is more efficient than theirs.

References

  1. Lee W.-B., Yeh C.-K., 2005. A New Delegation-based Authentication Protocol for Use in Portable Communication Systems. In IEEE Transactions Wireless Communication, vol. 4, no.1, pp. 57-64
  2. Tang C., Wu D. O.,2008. An Efficient Mobile Authentication for Wireless Networks. In IEEE Transactions Wireless Communication, vol. 7, no.4, pp. 1408-1416
  3. Tang C., Wu D. O., 2008. Mobile Privacy in Wireless Networks Revisited. In IEEE Transactions Wireless Communication, vol. 7, no.3, pp.1035-1042
  4. Youn T.-Y., Lim J., 2010. Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability. In IEEE Communications Letters, vol. 14, no. 9, pp.791-793
  5. Bellare M., Desai A., Jokipii E., Rogaway P., 1997. A Concrete Security Treatment of Symmetric Encryption. In: Proc. of the 38th IEEE Symp. on Found. of Computer Sci., pp. 394-403
  6. Lu J., Zhou J., 2010. The security of an efficient mobile authentication scheme for wireless networks, In WiCOM 2010: 6th International Conference on Wireless Communications Networking and Mobile Computing, Chengdu (China).
  7. NIST, 2009. NIST FIPS PUB 186-3, Digital Signature Standard (DSS) . U.S. Department of Commerce.
Download


Paper Citation


in Harvard Style

Lu J., Ren H. and Zhou J. (2011). EFFICIENT DELEGATION-BASED AUTHENTICATION PROTOCOL WITH STRONG MOBILE PRIVACY . In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2011) ISBN 978-989-8425-73-7, pages 123-127. DOI: 10.5220/0003606901230127


in Bibtex Style

@conference{winsys11,
author={Jian-Zhu Lu and Hong-Qing Ren and Jipeng Zhou},
title={EFFICIENT DELEGATION-BASED AUTHENTICATION PROTOCOL WITH STRONG MOBILE PRIVACY},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2011)},
year={2011},
pages={123-127},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003606901230127},
isbn={978-989-8425-73-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2011)
TI - EFFICIENT DELEGATION-BASED AUTHENTICATION PROTOCOL WITH STRONG MOBILE PRIVACY
SN - 978-989-8425-73-7
AU - Lu J.
AU - Ren H.
AU - Zhou J.
PY - 2011
SP - 123
EP - 127
DO - 10.5220/0003606901230127