Title page for etd-0812109-202320


[Back to Results | New Search]

URN etd-0812109-202320
Author Yen-hung Cheng
Author's Email Address No Public.
Statistics This thesis had been viewed 5350 times. Download 1723 times.
Department Computer Science and Engineering
Year 2008
Semester 2
Degree Master
Type of Document
Language English
Title One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks
Date of Defense 2009-07-07
Page Count 43
Keyword
  • Forward Secrecy
  • UMTS
  • False Base Attacks
  • Mobile Networks
  • Location Privacy
  • Mutual Authentication
  • Abstract In recent years, the development of mobile networks is thriving or flourishing from 2G GSM,
    2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all heterogeneous networks and becomes
    mature and popular nowadays. Using mobile devices for voice transferring and multimedia
    sharing is also a part of our life. Mobile networks provide us an efficient way to
    exchange messages easily. However, these messages often contain critical personal data or
    private information. Transferring these messages freely in mobile network is dangerous since
    they can be eavesdropped easily by malicious mobile users for some illegal purposes, such as
    committing a crime.
    Hence, to avoid the exposure of the transmitted messages, robust security mechanisms are
    required. In this thesis, we will propose a one-round mutual authentication protocol which is
    computation and communication efficient and secure such that the privacy of mobile users’
    identities and the confidentiality of their transmitted data are guaranteed. In computation
    complexity, the protocol only employs symmetric encryption and hash-mac functions. Due
    to the possession of forward secrecy, the past encrypted messages are secure, even under the
    exposure of long-term keys. Furthermore, our scheme achieves the goal of user privacy and
    location privacy by changing TMSI in every session. Therefore, the third party cannot link
    two different sessions by eavesdropping the communication. Finally, our scheme also can
    prevent false base attacks which make use of a powerful base station to redirect mobile users’
    messages to a fake base station to obtain certain advantages.
    Advisory Committee
  • Dah-Jyh Guan - chair
  • Chung-Huang Yang - co-chair
  • Wen-Shenq Juang - co-chair
  • Chun-I Fan - advisor
  • Files
  • etd-0812109-202320.pdf
  • indicate accessible in a year
    Date of Submission 2009-08-12

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have more questions or technical problems, please contact eThesys