One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity

Key Establishment for Wireless Roaming (KE-WR) is expected to ensure a mobile user to establish a fresh session key with a foreign WSP and also roam from one foreign network domain to another while enjoying the roaming services. However, so far there is no ID-based KE-WR protocol proposed in the literatures with a formal security proof in an appropriate model. The main work of this article address the current gap by first proposing a variation of classic CK and eCK model to support the wireless roaming scenario, which is called rCK model. This article extend classic security model by introducing the simulation of broadcast query and multiple Key Generation Center scenario and also giving the re-defined session definitions and additional adversary capability. Second, this article proposes a novel suite of One-Pass Key Establishment Protocols for Wireless Roaming.

[1]  Cas J. F. Cremers Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange , 2009, IACR Cryptol. ePrint Arch..

[2]  Zuoning Yin,et al.  Authentication on the edge: distributed authentication for a global open wi-fi network , 2007, MobiCom '07.

[3]  Xiaotie Deng,et al.  Efficient Anonymous Roaming and Its Security Analysis , 2005, ACNS.

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Colin Boyd,et al.  ID-based One-pass Authenticated Key Establishment , 2008, AISC.

[6]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[7]  J. David Irwin,et al.  Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation , 2008, Int. J. Netw. Secur..

[8]  Pin-Han Ho,et al.  PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks , 2009, IEEE Transactions on Vehicular Technology.

[9]  Kristin E. Lauter,et al.  Stronger Security of Authenticated Key Exchange , 2006, ProvSec.

[10]  Jianfeng Ma,et al.  An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing , 2010, Int. J. Netw. Secur..

[11]  Ya-Wen Yang,et al.  3G and WLAN Interworking Security: Current Status and Key , 2006, Int. J. Netw. Secur..

[12]  Hugo Krawczyk,et al.  Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.

[13]  Xiaotie Deng,et al.  TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[14]  Xiaotie Deng,et al.  Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension , 2008, J. Univers. Comput. Sci..

[15]  Pin-Han Ho,et al.  SLAB: A secure localized authentication and billing scheme for wireless mesh networks , 2008, IEEE Transactions on Wireless Communications.

[16]  Xiaotie Deng,et al.  Anonymous and Authenticated Key Exchange for Roaming Networks , 2007, IEEE Transactions on Wireless Communications.

[17]  Xiaotie Deng,et al.  Universal authentication protocols for anonymous wireless communications , 2010, IEEE Transactions on Wireless Communications.