Abstract

Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

Highlights

  • Mobile communication is becoming more and more popular such that many applications and services are provided in the mobile network environments [1]

  • A mobile user will obtain an anonymous identity after she/he is successfully authenticated by the system operator, and she/he will take this valid alias to roam over the mobile networks

  • We describe how a mobile user obtains anonymity, how the system charges an anonymous user via a credit-based method, and how the judge revokes the anonymity from an anonymous user who does something malicious

Read more

Summary

Introduction

Mobile communication is becoming more and more popular such that many applications and services are provided in the mobile network environments [1]. A mobile user will obtain an anonymous identity after she/he is successfully authenticated by the system operator, and she/he will take this valid alias to roam over the mobile networks. Owing to the unlinkability property, the technique of blind signatures [13] can help us with realizing complete anonymity for mobile users Another problem is that once a mobile user gets anonymity, how can the system operator charge her/him when she/he requests the mobile network services via an anonymous identity?. The privacy of the mobile users who misused the anonymity property can be revoked by the judge, and the police can trace the criminals who have gotten anonymity. We simultaneously realize the anonymity, credit-based chargeability, and fair privacy (revokeability and traceability) in our proposed authentication protocols for mobile communications. We did implementation to show the practical computation cost on cellphone

Some Requirements for Anonymous Authentication
The Proposed Protocols
Overview of Our Proposed Scheme
Key Generation
The Protocol for Requesting an Initial Anonymous Ticket
The Protocol for Charging Mobile Users
The Protocol for Privacy Revoking
Exceptions
Security Requirements
Unlinkability
Ticket Unforgeability
Tamper Resistance
Ticket Swindling Resistance
Secure Mutual Authentication
Secure Authenticated Key Exchange
The Forward Secrecy Extension
The Security Proof for the Forward Secrecy Extension
Comparisons
Performance Evaluation
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call