Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Trusted and anonymous authentication protocol for mobile networks
ZHANG Xin, YANG Xiaoyuan, ZHU Shuaishuai
Journal of Computer Applications    2016, 36 (8): 2231-2235.   DOI: 10.11772/j.issn.1001-9081.2016.08.2231
Abstract380)      PDF (783KB)(324)       Save
The lackness of trusted verification of mobile terminal may affect the security of mobile network. A trusted anonymous authentication protocol for mobile networks was proposed, in which both user identity and platform integrity were authenticated when the mobile terminal accesses the networks. On the basis of trusted network connection architecture, the concrete steps of trusted roaming authentication and trusted handover authentication were described in detail. The authentication used pseudonyms and the corresponding public/private keys to achieve the protection of the user anonymous privacy. The security analysis indicates that the proposed protocol meets mutual authentication, strong user anonymity, untraceability and conditional privacy preservation; moreover, the implementation of the first roaming authentication requires two rounds of communications while the handover authentication protocol just needs one round. The analytic comparisons show that the proposed protocol is efficient in terminal computation and turns of message exchange.
Reference | Related Articles | Metrics
Trusted access authentication protocol for mobile nodes in Internet of things
ZHANG Xin, YANG Xiaoyuan, ZHU Shuaishuai, YANG Haibing
Journal of Computer Applications    2016, 36 (11): 3108-3112.   DOI: 10.11772/j.issn.1001-9081.2016.11.3108
Abstract705)      PDF (787KB)(627)       Save
In view of the problem that mobile nodes lack trusted verification in Wireless Sensor Network (WSN), a mobile node access authentication protocol was proposed in Internet of Things (IoT). Mutual authentication and key agreement between the sensor nodes and mobile sink nodes were realized, when they wre authenticated. At the same time, the trustness of mobile node platform was authenticated by sensor nodes. The authentication scheme was based on trusted computing technology without using base station and its concrete steps were described in detail. Pseudonyms and the corresponding public/private keys were used in authentication to achieve the protection of the user privacy. The proposed scheme was provably secure in the CK (Canetti-Krawczyk) security model. Compared to similar mobile node schemes, the protocol is more suitable for fast authentication in IoT, with less computation and communication overhead.
Reference | Related Articles | Metrics