Abstract

An anonymous roaming scheme of mobile Internet was discussed in this paper aiming to improve the traditional authentication protocol that cannot satisfy the demand of user’s identity authentication when the mobile terminal is roaming in mobile Internet. The authentication server of remote network will complete the identity legitimacy verification of mobile terminal with the help of the home network authentication server. A temporary identity is used to prevent user’s anonymity protection from being tracked and eavesdropped, as well as other attacks, which can improve the confidential of user’s identity and location considerably. This anonymous roaming scheme can achieve a high-level of safety efficiently. This will also satisfy the development of the network technology.

Highlights

  • The Internet of Things (IoT) realizes the ubiquitous connection between Things and Things, and between Things and people, and realizes the intelligent perception, recognition, and management of objects and processes

  • In view of the above shortcomings of roaming authentication protocol, this paper proposes an anonymous roaming mechanism for mobile Internet

  • The relevant variables and operations used in this paper are defined as follows: IDA is the identity or related network label of A; TIDA is the temporary identity generated by the home authentication server HS for A; NumA is the random secret number selected by A; S is the secret number generated by the calculation; ⊕ is the exclusive OR operation ; ‖ connector; KSA is the private key of A; KPA is the public key of A; CertA is the certificate of A; and TA is the timestamp generated by A

Read more

Summary

Introduction

The Internet of Things (IoT) realizes the ubiquitous connection between Things and Things, and between Things and people, and realizes the intelligent perception, recognition, and management of objects and processes. For IoT, the anonymous roaming authentication mechanism is a key technology to ensure communication security. In [7], an Wireless Communications and Mobile Computing improved lightweight authentication protocol for wireless body area networks was created, and the security of the above scheme was proved in the random oracle. In view of the above shortcomings of roaming authentication protocol, this paper proposes an anonymous roaming mechanism for mobile Internet. In this mechanism, when MT roams into a remote network, the remote network authentication server will be assisted by its local network authentication server. The main innovation of this paper is its verification of the identity legitimacy of MT in roaming process, ensuring the anonymity of MT identity, which improves the process’s security and efficiency together, and makes up for the deficiency of traditional authentication protocol in identity anonymity and work efficiency while the MT is roaming

Anonymous Roaming Mechanism of Mobile Internet
MT Registering Home Network
MT Anonymous Roaming Mechanism
MT Applying for Service with Certificate
Certificate Structure
Verification of Legitimacy
CK Model
Authenticator Construction
Protocol in UM
The Anonymity and Untraceability of Users
Anonymity of Certificates
Calculation Efficiency
Communication Efficiency
Storage Efficiency
Extensibility
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call