首页 | 本学科首页   官方微博 | 高级检索  
     


Strong roaming authentication technique for wireless and mobile networks
Authors:Daojing He  Chun Chen  Sammy Chan  Jiajun Bu
Affiliation:1. College of Computer Science, Zhejiang University, , China;2. City University of Hong Kong, , Hong Kong SAR, China
Abstract:When one considers the broad range of wirelessly connected mobile devices used today, it is clear that integrating such network‐enabled devices into secure roaming over wireless networks is of essential importance. Over the years, many authentication protocols have been suggested to address this issue. Among these protocols, the recently proposed privacy‐preserving universal authentication protocol, Priauth, exceeds the security and efficiency of other authentication techniques. This paper studies the existing roaming authentication protocols and shows that they are not strong enough to provide secure roaming services in three aspects. Further, using Priauth as an example, we propose efficient remedies that fix the weaknesses. The experimental results show that the proposed approaches are feasible in practice. Copyright © 2012 John Wiley & Sons, Ltd.
Keywords:authentication  security and privacy  roaming service  wireless and mobile networks
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号