Title page for etd-0830112-142803


[Back to Results | New Search]

URN etd-0830112-142803
Author Yi-Wen Tong
Author's Email Address No Public.
Statistics This thesis had been viewed 5350 times. Download 206 times.
Department Computer Science and Engineering
Year 2011
Semester 2
Degree Master
Type of Document
Language English
Title Efficient Strong Anonymous Authentication Scheme for Wireless Communications
Date of Defense 2012-07-13
Page Count 73
Keyword
  • Authentication
  • Wireless Network
  • Anonymity
  • Group Signature
  • Revocation
  • Secure Roaming
  • Abstract Because of the popularity of wireless communication technologies, people can access
    servers without the restriction of place and time. With the rapid development of
    mobile devices, such as smart phones and iPads, the frequency of wireless networks
    have increased. Roaming services ensure service provision without location constraints.
    A secure roaming authentication protocol is critical for the security and
    privacy of users when accessing services by roaming. It ensures the authenticity
    of mobile users, and foreign and home servers. After authentication, the session
    key for the mobile user and the foreign server is established for secure communication.
    In addition, a secure roaming protocol may provide anonymity for mobile
    users. When the mobile user requests a service, the server is unable to identify two
    requests from the same user. For the current anonymous authentication protocols,
    the foreign server must fulfill the revocation check by the computation linear to the
    number of revoked users. It makes the protocol infeasible in practical environments.
    This thesis proposes a strong anonymous authentication protocol, using two-stage
    authentication, in which the home server is involved in the initial authentication
    to eliminate the revocation list and issues a timely anonymous credential for subsequent
    authentication after successful authentication. It reduces the computation
    costs for the revocation check and minimizes the size of the revocation list. Finally,
    this thesis also provides security proofs and comparisons of the proposed authentication
    mechanism.
    Advisory Committee
  • D.J. Guan - chair
  • Wei-Zhe Sun - co-chair
  • Chi-Yao Weng - co-chair
  • Shi-Ming Huang - co-chair
  • Chun-I Fan - advisor
  • Files
  • etd-0830112-142803.pdf
  • Indicate in-campus at 5 year and off-campus access at 5 year.
    Date of Submission 2012-08-30

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have more questions or technical problems, please contact eThesys