簡易檢索 / 詳目顯示

研究生: 周雷生
Chou, Lei Sheng
論文名稱: 無線蜂巢式網路中匿名認證協定之研究
Anonymous Authentication Protocols for Wireless Cellular Networks
指導教授: 蔡育仁
Yuh-Ren Tsai
王旭正
Shiuh-Jeng Wang
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2006
畢業學年度: 94
語文別: 英文
論文頁數: 55
中文關鍵詞: 無線通訊認證協定會議通訊匿名通訊
外文關鍵詞: Wireless communication, Authentication, Conference call, Anonymous
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 第二代行動通訊系統(GSM)已成為全球最廣泛使用的行動通信系統。目前的行動通訊系統業者為了達到高接通率及低阻斷率所以將很多認證協定機制關閉,這樣一來會造成攻擊者偽裝成合法使用者竊取服務和用戶資訊,以及其他衍生的問題等,如用戶身份隱私性和加解密計算的負荷與認證協定的運算。
    在這篇論文的第3章裡,我們提供一個高效率以及用戶與網路端雙向認證的機制去解決ㄧ些現在及未來有可能發生的攻擊行為。本篇論文也為用戶提供匿名通訊的服務以達到身份隱藏的效果。在第三章後半段,我們分析所提出來的方法是否可以抵擋目前的攻擊。
    這篇論文的第4章裡,我們改善Wang [37]所提出來的三個認證協定︰第一個是Call Set-up,第2個為用戶Hand-off時的認證協定,最後一個為匿名會議。我們利用Rabin加解密系統建造雙向認證機制的環境。藉由它的低計算量加密模式移動電話上裝並且為移動的用戶提供身分隱密性。在Hand-off過程中,我們提供此認證機制防止攻擊者偽裝成合法的基地台欺騙用戶端。最後匿名會議系統中,我們利用橢圓曲線加解密系統來分佈會議中的會議金鑰。在很多應用中,主持人不希望與會者所做的決定受到其他與會者的影響,如此可以利用匿名通訊來達到此要求。我們所提出來的方法就是用來解決這個問題。


    The Global System for Mobile Communication (GSM) is widely regarded as the convenient digital mobile communication systems. However, many problems arise relating to data confidentiality, user privacy, and computational load. In the chapter 3 of this thesis, we provide some solutions to address problems, and do not change the GSM architecture. We also provide anonymous channel for user location privacy. One of our basic objects is to construct anonymous environment in wireless cellular networks and then we would apply it to the third generation mobile communication system or the novel communication system.
    In the chapter 4 of this thesis, three secure and anonymous authentication protocols are proposed for cellular mobile system: The first one is for call set-up, the second one is for hand-off, and last one is an anonymous call. We utilize the Rabin’s cryptosystem to construct a mutual authentication protocol on call set-up procedure. It can reduce computation load on mobile encrypting the message and provide mobile subscribers with user identity privacy. In hand-off procedure, we provide a protocol to protect mobile against BS spoofing. Finally, we construct a conference key distribution system based on Elliptic Curve Cryptosystem (ECC for short) [1]. In many applications, the attendees of a conference should be anonymous to each other (expect to the conference initiator who choose the attendees). Furthermore, we propose an anonymous conference protocol for mobile system.

    Abstract i Contents ii Figure Contents v 1 Introduction 1 2 Preliminaries and Related Works 4 2.1 GSM architecture 4 2.1.1 Original GSM authentication 4 2.1.2 Drawbacks on the GSM Security 5 2.2 Definitions on Quadratic Residues 6 Definition 1 6 Definition 2 7 Encryption 7 Decryption 8 Signature 9 3 Mutual Authentications and Anonymous Communications in the GSM Systems 10 3.1 Introduction 10 3.2 Related Works 10 3.2.1 Lee-Hwang-Yang Authentication Protocol for Mobile Communication 11 3.2.2 Alberto Authentication Protocol for the GSM 12 3.2.2.1 Ticket Issuing Phase 12 3.2.2.2 Ticket Utilization Phase 14 3.3 Our Proposed Method 15 3.3.1 Notation 15 3.3.2 Environment Setting 16 3.3.3 Enhancement Authentication Protocol for the GSM System 18 3.3.3.1 Initial Authentication Phase 18 3.3.3.2 Subsequence Authentication Phase 20 3.4 Discussions 21 3.4.1 Security Analysis 21 3.4.1.1 Surveying BAN-Logic 21 Basic Notation 22 Logical Postulate 23 Idealized Protocols and Goals of Authentication 25 3.4.1.2 Analysis the Proposed Protocol with BAN Logic 25 3.4.2 Countermeasures of Attacks 28 Replaying Attack 28 Impersonating Attack 28 Man in Middle Attack 30 Known Key Attack with Compromise Session Key 31 User Identity Privacy 31 3.4.3 Mutual Authentication between the Network end and the Mobile User 31 3.4.4 Comparisons 32 4 Low Computing Complexity Wireless Authentication Protocols in Communication Networks 35 4.1 Introduction 35 4.2 Related Works 37 4.3 The proposed method 39 4.3.1 Notations 39 4.3.2 Call Set-Up Authentication Protocol 40 4.3.3 Hand-Off Authentication Protocol 43 4.3.4 Anonymous Conference Call Protocol 44 4.4 Discussions 47 5. Conclusions and Future Works 49 Bibliography 51

    [1] C.H. Lin, C.Y. Lee and W. Lee, “Comments on the Yang-Chang-Hwang Anonymous Conference Key Distribution System,” Computer Standards and Interfaces 26, pp. 171-174, 2004
    [2] ETSI, “Recommendation GSM 03.20: Security Related Network Functions,” Tech. Rep., European Telecommunications Standards Institute, June 1993.
    [3] B. Mallinder, “An Overview of the GSM System,” in Proc. of Third Nordic Seminar on digital band mobile radio comm., Copenhagen, Denmark, pp. 12-15, 1988.
    [4] M. Rahnema, “Overview of the GSM System and Protocol Architecture,” IEEE Communications Magazine, vol. 31, pp. 92-100, 1993.
    [5] A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE, Personal Communications, vol. l, pp. 24-31, 1994.
    [6] M.J. Beller, L.F. Chang, and Y. Yacobi, “Privacy and Authentication on A Portable Communications System,” IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, 1993.
    [7] M.S. Hwang, and C.H. Hwang, “Authenticated Key-Exchange in Mobile Radio Network,” European Transactions on Telecommunications, Vol. 8, pp. 265-269, 1997.
    [8] Alberto Peinado, “Privacy and Authentication Protocol Providing Anonymous Channels in GSM,” Computer Communications, vol. 27, pp. 1709-1715, 2004.
    [9] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120–126, 1978.
    [10] J. Hastad, “On Using RSA with Low Exponent in A Public Key Network,” In Advance in Cryptology - Crypto’85, H. C. Williams, Ed., vol. 218 of Lectures Notes in Computer Science, Springer-Verlag, pp. 403–408, 1985.
    [11] M.S. Hwang, “A Remote Password Authentication Scheme Based on the Digital Signature Method,” International Journal of Computer Mathematics, vol. 70, pp. 657-666, 1999.
    [12] M.S. Hwang, C.C. Lee, and Y.L. Tang, “An Improvement of SPLlCE/AS in WIDE Against Guessing Attack,” Information, vol. 2, pp. 297-302, 2001.
    [13] T. Hwang, “Scheme for Secure Digital Mobile Communications Based on Symmetric Key Cryptography,” Information Processing Letters, pp. 35–37, 1993.
    [14] D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, pp. 84–88, 1981.
    [15] D. Chaum, “The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability,” J. Cryptology, Vol. 1, pp. 65–75, 1988.
    [16] S. P. Shieh, F. S. Ho and Y. L. Huang, “An Efficient Authentication Protocol for Mobile Networks,” Journal of Information Science and Engineering, vol. 15, pp. 505-520, 1999.
    [17] H.Y. Lin, “Security and Authentication in PCS,” Computers and Electrical Engineering, vol. 25, pp.225-248, 1999.
    [18] L. Harn and H.Y. Lin, “Modification to Enhance the Security of the GSM Protocol,” in Proc. of the 5th National Conference on Information Security, pp. 74–76, 1995.
    [19] C.H. Lee, M.S. Hwang, W.P. Yang, “Extension of Authentication Protocol for GSM,” IEE Proceedings communications, vol. 150, pp. 91-95, 2003.
    [20] C.H. Lee, M.S. Hwang, and W.P. Yang, “Enhanced Privacy and Authentication for the Global System for Mobile Communications,” Wireless Network, vol. 5, pp. 231-243, 1999.
    [21] M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” ACM Trans. Computer Systems, vol. 1, pp. 18–36, 1990.
    [22] C. Boyd and A. Mathuria, “Key Establishment Protocols for Secure Mobile Communications: A Critical Survey,” Computer Communications, vol. 23, pp. 575–587, 2000.
    [23] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal of Computing, vol. 32, pp. 586–615, 2003.
    [24] A. Myles, D.B. Johnson and C. Perkins; “A Mobile Host Protocol Supporting Route Optimization and Authentication,” IEEE Journal on Selected Areas in Communications, vol. 13, pp. 839-849, 1995.
    [25] G. Coomaraswamy and S.P.R. Kumar, “A Novel Method for Key Exchange and Authentication with Cellular Network Applications,” in Proc. IEEE Conf. Universal Personal Comm. (ICUPC ‘93), vol. 1, pp.186-190, 1993.
    [26] A. Ashar and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Comm., vol. 1, pp. 25-31, 1994.
    [27] H.Y. Lin and L. Harn, “Authentication in Wireless Communications,” in Proc. IEEE Global Com’93, vol. 1, pp.550-554, 1993.
    [28] M.J. Beller, L.F. Chang, and Y. Yacobi, “Privacy and Authentication on A Portable Communications System,” IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, 1993.
    [29] M.O. Rabin, “Digitalized Signature and Public Key Functions as Intractable as Factorization,” MIT/LCS/TR-212, 1979.
    [30] M.S. Hwang, “Dynamic Participation in A Secure Conference Scheme for Mobile Communications,” IEEE Trans. Vehicular Technology, vol. 48, , pp. 1469-1474, 1999.
    [31] X. Yi, C.K. Siew, and C.H. Tan, “A Secure and Efficient Conference Scheme for Mobile Communications,” IEEE Trans. Vehicular Technology, vol. 52, pp. 784-793, 2003.
    [32] X. Yi, C.K. Siew, C.H. Tan, and Y. Ye, “A Secure Conference Scheme for Mobile Communications,” IEEE Trans. Wireless Comm., vol. 2, pp. 1168-1177, 2003.
    [33] Y.M. Tseng, and J.K. Jan, “Anonymous Conference Key Distribution Systems Based on Discrete Logarithm Problem,” Computer Communications, vol.22, pp. 749– 754, 1999.
    [34] C.C. Yang, T.Y. Chang, M.S. Hwang, “Comment on Tseng– Jan Anonymous Conference Key Distribution System without Using A One-Way Hash Function,” Technical Report CYUT-IM-TR-2002-016, CYUT, 2002.
    [35] C.C. Yang, T.Y. Chang, and M.S. Hwang, “A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem,” Computer Standards and Interfaces 25, pp. 141-145, 2003.
    [36] Q. Tang and C.J. Mitchell, “Cryptanalysis of An Anonymous Wireless Authentication and Conference Key Distribution Scheme,” Cryptology EPrint, vol. 47, 2005
    [37] S.J. Wang, “Anonymous Wireless Authentication on a Portable Cellular Mobile System,” IEEE Transaction on Computers, vol. 53, pp.1317-1329, 2004.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE