An Individual and Group Authentication Model for Wireless Network Services

Authentication is the most important component to protect information system from unauthorized access. Because mobile devices have resource limitations, current existing authentication methods experience security, efficiency, flexibility and scalability problems in wireless network services. Although many access control methods utilize both individuals and groups while validating authorization, there has been up to date no authentication mechanism supporting both group and individual. To overcome the existing problems, an authentication model for large scale wireless network is proposed in this paper. It provides secure, efficient, flexible and scalable authentication for wireless network users and services. To exhibit the security and efficiency characteristics, a realization of the authentication model using dynamic key cryptography and group key management for individual and group of users and services is also proposed. Its analysis demonstrates the advantages in security, efficiency, flexibility and scalability of both individual and group authentication to existing authentication methods.

[1]  Leonardo A. Martucci,et al.  A Lightweight Distributed Group Authentication Mechanism , 2004 .

[2]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Qiang Tang,et al.  Cryptanalysis of a hybrid authentication protocol for large mobile networks , 2006, J. Syst. Softw..

[5]  Hung-Yu Chien,et al.  A hybrid authentication protocol for large mobile network , 2003, J. Syst. Softw..

[6]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[7]  Eric S. Raymond,et al.  The Art of Unix Programming , 2003 .

[8]  Huy Hoang Ngo,et al.  Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..

[9]  Pearl Brereton,et al.  Service-based software: the future for flexible software , 2000, Proceedings Seventh Asia-Pacific Software Engeering Conference. APSEC 2000.

[10]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[11]  Yiling Wang,et al.  Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[12]  Paul F. Syverson,et al.  The Logic of Authentication Protocols , 2000, FOSAD.

[13]  Huy Hoang Ngo,et al.  Package-Role Based Authorization Control Model for Wireless Network Services , 2009, 2009 International Conference on Availability, Reliability and Security.

[14]  Seung-Hun Jin,et al.  The Security Limitations of SSO in OpenID , 2008, 2008 10th International Conference on Advanced Communication Technology.

[15]  Z. Kotulski,et al.  A new protocol for group authentication providing partial anonymity , 2005, Next Generation Internet Networks, 2005.

[16]  Michele Bugliesi,et al.  Principles for Entity Authentication , 2003, Ershov Memorial Conference.

[17]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.