研究生: |
周雷生 Chou, Lei Sheng |
---|---|
論文名稱: |
無線蜂巢式網路中匿名認證協定之研究 Anonymous Authentication Protocols for Wireless Cellular Networks |
指導教授: |
蔡育仁
Yuh-Ren Tsai 王旭正 Shiuh-Jeng Wang |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 通訊工程研究所 Communications Engineering |
論文出版年: | 2006 |
畢業學年度: | 94 |
語文別: | 英文 |
論文頁數: | 55 |
中文關鍵詞: | 無線通訊 、認證協定 、會議通訊 、匿名通訊 |
外文關鍵詞: | Wireless communication, Authentication, Conference call, Anonymous |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
第二代行動通訊系統(GSM)已成為全球最廣泛使用的行動通信系統。目前的行動通訊系統業者為了達到高接通率及低阻斷率所以將很多認證協定機制關閉,這樣一來會造成攻擊者偽裝成合法使用者竊取服務和用戶資訊,以及其他衍生的問題等,如用戶身份隱私性和加解密計算的負荷與認證協定的運算。
在這篇論文的第3章裡,我們提供一個高效率以及用戶與網路端雙向認證的機制去解決ㄧ些現在及未來有可能發生的攻擊行為。本篇論文也為用戶提供匿名通訊的服務以達到身份隱藏的效果。在第三章後半段,我們分析所提出來的方法是否可以抵擋目前的攻擊。
這篇論文的第4章裡,我們改善Wang [37]所提出來的三個認證協定︰第一個是Call Set-up,第2個為用戶Hand-off時的認證協定,最後一個為匿名會議。我們利用Rabin加解密系統建造雙向認證機制的環境。藉由它的低計算量加密模式移動電話上裝並且為移動的用戶提供身分隱密性。在Hand-off過程中,我們提供此認證機制防止攻擊者偽裝成合法的基地台欺騙用戶端。最後匿名會議系統中,我們利用橢圓曲線加解密系統來分佈會議中的會議金鑰。在很多應用中,主持人不希望與會者所做的決定受到其他與會者的影響,如此可以利用匿名通訊來達到此要求。我們所提出來的方法就是用來解決這個問題。
The Global System for Mobile Communication (GSM) is widely regarded as the convenient digital mobile communication systems. However, many problems arise relating to data confidentiality, user privacy, and computational load. In the chapter 3 of this thesis, we provide some solutions to address problems, and do not change the GSM architecture. We also provide anonymous channel for user location privacy. One of our basic objects is to construct anonymous environment in wireless cellular networks and then we would apply it to the third generation mobile communication system or the novel communication system.
In the chapter 4 of this thesis, three secure and anonymous authentication protocols are proposed for cellular mobile system: The first one is for call set-up, the second one is for hand-off, and last one is an anonymous call. We utilize the Rabin’s cryptosystem to construct a mutual authentication protocol on call set-up procedure. It can reduce computation load on mobile encrypting the message and provide mobile subscribers with user identity privacy. In hand-off procedure, we provide a protocol to protect mobile against BS spoofing. Finally, we construct a conference key distribution system based on Elliptic Curve Cryptosystem (ECC for short) [1]. In many applications, the attendees of a conference should be anonymous to each other (expect to the conference initiator who choose the attendees). Furthermore, we propose an anonymous conference protocol for mobile system.
[1] C.H. Lin, C.Y. Lee and W. Lee, “Comments on the Yang-Chang-Hwang Anonymous Conference Key Distribution System,” Computer Standards and Interfaces 26, pp. 171-174, 2004
[2] ETSI, “Recommendation GSM 03.20: Security Related Network Functions,” Tech. Rep., European Telecommunications Standards Institute, June 1993.
[3] B. Mallinder, “An Overview of the GSM System,” in Proc. of Third Nordic Seminar on digital band mobile radio comm., Copenhagen, Denmark, pp. 12-15, 1988.
[4] M. Rahnema, “Overview of the GSM System and Protocol Architecture,” IEEE Communications Magazine, vol. 31, pp. 92-100, 1993.
[5] A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE, Personal Communications, vol. l, pp. 24-31, 1994.
[6] M.J. Beller, L.F. Chang, and Y. Yacobi, “Privacy and Authentication on A Portable Communications System,” IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, 1993.
[7] M.S. Hwang, and C.H. Hwang, “Authenticated Key-Exchange in Mobile Radio Network,” European Transactions on Telecommunications, Vol. 8, pp. 265-269, 1997.
[8] Alberto Peinado, “Privacy and Authentication Protocol Providing Anonymous Channels in GSM,” Computer Communications, vol. 27, pp. 1709-1715, 2004.
[9] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120–126, 1978.
[10] J. Hastad, “On Using RSA with Low Exponent in A Public Key Network,” In Advance in Cryptology - Crypto’85, H. C. Williams, Ed., vol. 218 of Lectures Notes in Computer Science, Springer-Verlag, pp. 403–408, 1985.
[11] M.S. Hwang, “A Remote Password Authentication Scheme Based on the Digital Signature Method,” International Journal of Computer Mathematics, vol. 70, pp. 657-666, 1999.
[12] M.S. Hwang, C.C. Lee, and Y.L. Tang, “An Improvement of SPLlCE/AS in WIDE Against Guessing Attack,” Information, vol. 2, pp. 297-302, 2001.
[13] T. Hwang, “Scheme for Secure Digital Mobile Communications Based on Symmetric Key Cryptography,” Information Processing Letters, pp. 35–37, 1993.
[14] D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, pp. 84–88, 1981.
[15] D. Chaum, “The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability,” J. Cryptology, Vol. 1, pp. 65–75, 1988.
[16] S. P. Shieh, F. S. Ho and Y. L. Huang, “An Efficient Authentication Protocol for Mobile Networks,” Journal of Information Science and Engineering, vol. 15, pp. 505-520, 1999.
[17] H.Y. Lin, “Security and Authentication in PCS,” Computers and Electrical Engineering, vol. 25, pp.225-248, 1999.
[18] L. Harn and H.Y. Lin, “Modification to Enhance the Security of the GSM Protocol,” in Proc. of the 5th National Conference on Information Security, pp. 74–76, 1995.
[19] C.H. Lee, M.S. Hwang, W.P. Yang, “Extension of Authentication Protocol for GSM,” IEE Proceedings communications, vol. 150, pp. 91-95, 2003.
[20] C.H. Lee, M.S. Hwang, and W.P. Yang, “Enhanced Privacy and Authentication for the Global System for Mobile Communications,” Wireless Network, vol. 5, pp. 231-243, 1999.
[21] M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” ACM Trans. Computer Systems, vol. 1, pp. 18–36, 1990.
[22] C. Boyd and A. Mathuria, “Key Establishment Protocols for Secure Mobile Communications: A Critical Survey,” Computer Communications, vol. 23, pp. 575–587, 2000.
[23] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal of Computing, vol. 32, pp. 586–615, 2003.
[24] A. Myles, D.B. Johnson and C. Perkins; “A Mobile Host Protocol Supporting Route Optimization and Authentication,” IEEE Journal on Selected Areas in Communications, vol. 13, pp. 839-849, 1995.
[25] G. Coomaraswamy and S.P.R. Kumar, “A Novel Method for Key Exchange and Authentication with Cellular Network Applications,” in Proc. IEEE Conf. Universal Personal Comm. (ICUPC ‘93), vol. 1, pp.186-190, 1993.
[26] A. Ashar and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE Personal Comm., vol. 1, pp. 25-31, 1994.
[27] H.Y. Lin and L. Harn, “Authentication in Wireless Communications,” in Proc. IEEE Global Com’93, vol. 1, pp.550-554, 1993.
[28] M.J. Beller, L.F. Chang, and Y. Yacobi, “Privacy and Authentication on A Portable Communications System,” IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, 1993.
[29] M.O. Rabin, “Digitalized Signature and Public Key Functions as Intractable as Factorization,” MIT/LCS/TR-212, 1979.
[30] M.S. Hwang, “Dynamic Participation in A Secure Conference Scheme for Mobile Communications,” IEEE Trans. Vehicular Technology, vol. 48, , pp. 1469-1474, 1999.
[31] X. Yi, C.K. Siew, and C.H. Tan, “A Secure and Efficient Conference Scheme for Mobile Communications,” IEEE Trans. Vehicular Technology, vol. 52, pp. 784-793, 2003.
[32] X. Yi, C.K. Siew, C.H. Tan, and Y. Ye, “A Secure Conference Scheme for Mobile Communications,” IEEE Trans. Wireless Comm., vol. 2, pp. 1168-1177, 2003.
[33] Y.M. Tseng, and J.K. Jan, “Anonymous Conference Key Distribution Systems Based on Discrete Logarithm Problem,” Computer Communications, vol.22, pp. 749– 754, 1999.
[34] C.C. Yang, T.Y. Chang, M.S. Hwang, “Comment on Tseng– Jan Anonymous Conference Key Distribution System without Using A One-Way Hash Function,” Technical Report CYUT-IM-TR-2002-016, CYUT, 2002.
[35] C.C. Yang, T.Y. Chang, and M.S. Hwang, “A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem,” Computer Standards and Interfaces 25, pp. 141-145, 2003.
[36] Q. Tang and C.J. Mitchell, “Cryptanalysis of An Anonymous Wireless Authentication and Conference Key Distribution Scheme,” Cryptology EPrint, vol. 47, 2005
[37] S.J. Wang, “Anonymous Wireless Authentication on a Portable Cellular Mobile System,” IEEE Transaction on Computers, vol. 53, pp.1317-1329, 2004.