Authentication Protocol in Heterogeneous Networks Based on Proxy Signature
Date Issued
2009
Date
2009
Author(s)
Shih, Hsiang-Teng
Abstract
In comparison with traditional wired network, it has characteristics such as easy deployment, high scalability, and ease of use, etc, in wireless network. Under high demand of end-user, a variety of wireless technologies, e.g. GPRS (General Packet Radio Service), 3G network, Bluetooth, IEEE 802.11, etc, develop rapidly in recent years. Nevertheless, each wireless technology has its pros & cons and suitable situation. For example, GPRS and 3G network have a large coverage but they only provide services with transmission rate from 144Kbps to 2Mbps. On the contrary, IEEE 802.11 provides higher transmission rate though it has limited (only hot spot) coverage. As a result, it’s an important trend to integrate various wireless technologies to provide end users best network selection based on his / her service needs [4][5].n this thesis, under the definition of 3GPP (3rd Generation Partnership Project) [1], we propose an authentication protocol in heterogeneous (3G-WLAN) networks using techniques like public-key cryptosystems [14][15], one-way hash chain [11][12], and proxy-signature [13]. It not only provides authentication services as EAP-AKA but also improves the issues of SQN resynchronization and possible Authentication Vector compromise. Also, the characteristic of one-way hash chain value is utilized to provide fast re-authentication to enhance the authentication efficiency of EAP-AKA while the MS is far away from HLR / HSS.n comparison with other proposed authentication protocols, we have enhanced the capabilities such as identity (IMSI) privacy, complete mutual authentication, and decreased the amount of exchange messages during authentication. The computational load of MS and the complexity of key management are much lower while compared with Public-key based authentication protocols. The non-repudiation property is included to provide fair billing mechanism in the future. Besides, our proposed protocol has stronger capabilities to withstand various attack patterns to decrease the possibility of information disclosure.
Subjects
Wireless Network
Heterogeneous Network
Proxy Signature
One-way Hash Chain
Public-key Cryptosystem
Authentication Protocol
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-98-R92921034-1.pdf
Size
23.32 KB
Format
Adobe PDF
Checksum
(MD5):2c9d74a13cb84365085447837421fa56
