Efficient privacy-preserving authentication in wireless mobile networks

Hyo Jin Jo, Jung Ha Paik, Dong Hoon Lee

Research output: Contribution to journalArticle

44 Citations (Scopus)

Abstract

Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of users, there have been researches on anonymous authentication. In particular, anonymous authentication without the participation of home servers has attracted considerable interest owing to its influence on the communication efficiency. Unfortunately, the previously proposed anonymous authentication schemes have serious practical shortcomings, such as high communication and computation costs and huge revocation lists. In this paper, we propose a novel three-round anonymous roaming protocol that does not require the participation of home servers. The proposed protocol uses a pseudo-identity-based signcryption scheme to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the number of pseudo-identities stored in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols. The proposed protocol is formally proved in the Canetti-Krawczyk (CK) model.

Original languageEnglish
Article number6636293
Pages (from-to)1469-1481
Number of pages13
JournalIEEE Transactions on Mobile Computing
Volume13
Issue number7
DOIs
Publication statusPublished - 2014 Jan 1

Fingerprint

Authentication
Wireless networks
Network protocols
Servers
Communication
Costs

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Software

Cite this

Efficient privacy-preserving authentication in wireless mobile networks. / Jo, Hyo Jin; Paik, Jung Ha; Lee, Dong Hoon.

In: IEEE Transactions on Mobile Computing, Vol. 13, No. 7, 6636293, 01.01.2014, p. 1469-1481.

Research output: Contribution to journalArticle

@article{2fe330889d7d4def8e38a27685973a7c,
title = "Efficient privacy-preserving authentication in wireless mobile networks",
abstract = "Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of users, there have been researches on anonymous authentication. In particular, anonymous authentication without the participation of home servers has attracted considerable interest owing to its influence on the communication efficiency. Unfortunately, the previously proposed anonymous authentication schemes have serious practical shortcomings, such as high communication and computation costs and huge revocation lists. In this paper, we propose a novel three-round anonymous roaming protocol that does not require the participation of home servers. The proposed protocol uses a pseudo-identity-based signcryption scheme to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the number of pseudo-identities stored in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols. The proposed protocol is formally proved in the Canetti-Krawczyk (CK) model.",
keywords = "Anonymity, authentication, Canetti-Krawczyk (CK) model, privacy, revocation, secure roaming",
author = "Jo, {Hyo Jin} and Paik, {Jung Ha} and Lee, {Dong Hoon}",
year = "2014",
month = "1",
day = "1",
doi = "10.1109/TMC.2013.134",
language = "English",
volume = "13",
pages = "1469--1481",
journal = "IEEE Transactions on Mobile Computing",
issn = "1536-1233",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "7",

}

TY - JOUR

T1 - Efficient privacy-preserving authentication in wireless mobile networks

AU - Jo, Hyo Jin

AU - Paik, Jung Ha

AU - Lee, Dong Hoon

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of users, there have been researches on anonymous authentication. In particular, anonymous authentication without the participation of home servers has attracted considerable interest owing to its influence on the communication efficiency. Unfortunately, the previously proposed anonymous authentication schemes have serious practical shortcomings, such as high communication and computation costs and huge revocation lists. In this paper, we propose a novel three-round anonymous roaming protocol that does not require the participation of home servers. The proposed protocol uses a pseudo-identity-based signcryption scheme to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the number of pseudo-identities stored in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols. The proposed protocol is formally proved in the Canetti-Krawczyk (CK) model.

AB - Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of users, there have been researches on anonymous authentication. In particular, anonymous authentication without the participation of home servers has attracted considerable interest owing to its influence on the communication efficiency. Unfortunately, the previously proposed anonymous authentication schemes have serious practical shortcomings, such as high communication and computation costs and huge revocation lists. In this paper, we propose a novel three-round anonymous roaming protocol that does not require the participation of home servers. The proposed protocol uses a pseudo-identity-based signcryption scheme to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the number of pseudo-identities stored in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols. The proposed protocol is formally proved in the Canetti-Krawczyk (CK) model.

KW - Anonymity

KW - authentication

KW - Canetti-Krawczyk (CK) model

KW - privacy

KW - revocation

KW - secure roaming

UR - http://www.scopus.com/inward/record.url?scp=84903770382&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84903770382&partnerID=8YFLogxK

U2 - 10.1109/TMC.2013.134

DO - 10.1109/TMC.2013.134

M3 - Article

VL - 13

SP - 1469

EP - 1481

JO - IEEE Transactions on Mobile Computing

JF - IEEE Transactions on Mobile Computing

SN - 1536-1233

IS - 7

M1 - 6636293

ER -