A Group-based End-to-end Identity Authentication Method for Massive Power Wireless Private Network

In view of the frequent access problem of massive terminal equipment in the power wireless private network, it is necessary to develop more efficient access authentication mechanism and technology. This paper designs a new privacy-enhanced group authentication protocol for wireless networks based on the end-to-end identity authentication framework of massive power wireless private networks in groups. Compared with the traditional end-to-end authentication method, this protocol enhances the privacy protection function. At the same time. the protocol can meet the real-time requirements of group communication scenarios, and can also better meet the business requirements of power wireless private network.

[1]  Bala Srinivasan,et al.  An Individual and Group Authentication Model for Wireless Network Services , 2010, J. Convergence Inf. Technol..

[2]  Jui-Tang Wang,et al.  Group-Based Authentication and Key Agreement , 2012, Wirel. Pers. Commun..

[3]  C. Mitrpant,et al.  An improved proof for RFID tags , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[4]  Erl-Huei Lu,et al.  Grouping Proof for RFID , 2011 .

[5]  Sang-Soo Yeo,et al.  Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[6]  L. Bolotnyy,et al.  Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.

[7]  C. Mitrpant,et al.  Performance comparison of the authentication protocols in RFID system , 2010, MEDES.

[8]  Kouichi Sakurai,et al.  Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).