2 options
An improved and robust anonymous authentication scheme for roaming in global mobility networks / Ahmed Fraz Baig.
- Format:
- Book
- Author/Creator:
- Baig, Ahmed Fraz, author.
- Language:
- German
- Subjects (All):
- Wireless communication systems.
- Mobile communication systems.
- Physical Description:
- 1 online resource (54 pages)
- Edition:
- 1st ed.
- Place of Publication:
- Hamburg, [Germany] : Anchor Academic Publishing, 2017.
- Summary:
- Wireless communication systems are extensively used in the current decade. Internet based applications are accessed by mobile networks at any time and from anywhere. Nowadays, roaming in mobile communication has become extremely popular. Mobility is the function that allows a user to move around and, at the same time, stay inside the network. The Global Mobility Network (GLOMONET) plays a very important role in wireless communication. It is a commodious domain which enables a roaming user to access their home mobile services in a foreign country. While traveling, the roaming service assures that our mobile or wireless devices are connected with a network without any breakage of connection. When persons visit some other country they have to use the mobile services. In GLOMONET, the roaming user, being in a foreign country, uses the mobile services with the help of their home country network. Mobile users connect themselves to a foreign network and the foreign network verifies the legality of the mobile user through their home network and home agent. Due to the technological improvements, many security issues have been raised up. Security is the main issue in wireless communication because anyone may intercept the communication at any time. While designing the security protocols for wireless networks, communication and computation costs are very important. The objective of this study is to propose an authentication scheme that has the ability to detect and resist all possible attacks. Formal security analysis and authenticity of proposed thesis is analyzed with BAN logic and ProVerif. Furthermore, the author checked the security of the proposed scheme informally against different attacks.
- Contents:
- An Improved and RobustAnonymous AuthenticationScheme for Roaming inGlobal Mobility Networks
- Acknowledgments
- Abstract
- Contents
- List of Figures
- List of Tables
- Chapter 1 Introduction
- 1.1 Authentication in GLOMONET
- 1.2 Preliminaries
- 1.2.1 Hash Function
- 1.2.2 Elliptic Curve Cryptography(ECC)
- 1.3 Objectives
- 1.4 Thesis outline
- Chapter 2 Literature Review
- 2.1 Literature Survey
- 2.2 Karuppiah-Saravanan's scheme review
- 2.2.1 Initialization phase
- 2.2.2 Registration Phase
- 2.2.3 Login-Authentication Phase
- 2.2.4 Password Change Phase
- 2.2.5 Cryptanalysis and security weaknesses in Karuppiah-Saravanan's Scheme
- 2.3 Gope-Hwang's scheme review
- 2.3.1 Registration-reestablishment Phase
- 2.3.2 Mutual-Authentication Phase with key-agreement phase
- 2.3.3 Password Change Phase
- 2.3.4 Security weaknesses in Gope-Hwang's Scheme
- 2.4 Islam et al.'s scheme review
- 2.4.1 Registration Phase
- 2.4.2 Login Phase
- 2.4.3 Authentication Phase
- 2.4.4 Password Change Phase
- 2.4.5 Revocation of lost SC Phase
- 2.4.6 Cryptanalysis of Islam et al's. scheme
- 2.5 Problem Statement
- 2.6 Chapter Summary
- Chapter 3 Proposed Scheme
- 3.1 Initialization Phase
- 3.2 Registration Phase
- 3.3 Login Phase
- 3.4 Authentication Phase
- 3.5 Password change Phase
- 3.6 Chapter Summary
- Chapter 4 Security Analysis and Computation Cost Analysis
- 4.1 Security Analysis
- 4.1.1 Security Analysis with BAN logic
- 4.1.2 Security Analysis with ProVerif
- 4.1.3 Informal Security Analysis
- 4.1.4 Security Requirements and Comparison
- 4.1.5 Security Requirements
- 4.2 Computation Cost Analysis
- 4.3 Chapter Summary
- Chapter 5 Conclusion and Future work
- Bibliography.
- Notes:
- Includes bibliographical references.
- Description based on online resource; title from PDF title page (EBC, viewed December 14, 2017).
- ISBN:
- 3-96067-647-6
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.