Distributed anonymous authentication in heterogeneous networks

Nowadays, the design of a secure access authentication protocol in heterogeneous networks achieving seamless roaming across radio access technologies for mobile users (MUs) is a major technical challenge. This paper proposes a Distributed Anonymous Authentication (DAA) protocol to resolve the problems of heavy signaling overheads and long signaling delay when authentication is executed in a centralized manner. By applying MUs and point of attachments (PoAs) as group members, the adopted group signature algorithms provide identity verification directly without sharing secrets in advance, which significantly reduces signaling overheads. Moreover, MUs sign messages on behalf of the group, so that anonymity and unlinkability against PoAs are provided and thus privacy is preserved. Performance analysis confirm the advantages of DAA over existing solutions.

[1]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[2]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[3]  Rong Wang,et al.  Mutual Authentication in Wireless Mesh Networks , 2008, 2008 IEEE International Conference on Communications.

[4]  Hao Chen,et al.  Distributed authentication for low-cost wireless networks , 2008, HotMobile '08.

[5]  J. David Irwin,et al.  Localized authentication for wireless LAN inter-networking roaming , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[6]  Xiaotie Deng,et al.  Anonymous and Authenticated Key Exchange for Roaming Networks , 2007, IEEE Transactions on Wireless Communications.

[7]  Mohammad Ilyas,et al.  Towards Certificate-Based Authentication for Future Mobile Communications , 2004, Wirel. Pers. Commun..

[8]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[11]  Xiaotie Deng,et al.  Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension , 2008, J. Univers. Comput. Sci..

[12]  Wei Liang,et al.  A quantitative study of authentication and QoS in wireless IP networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[13]  Goo Yeon Lee,et al.  Mutual authentication protocols for the virtual home environment in 3G mobile network , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.