http://iet.metastore.ingenta.com
1887

Anonymous roaming in universal mobile telecommunication system mobile networks

Anonymous roaming in universal mobile telecommunication system mobile networks

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A secure roaming protocol for mobile networks is proposed. Roaming has been analysed in some schemes from the security point of view; however, there are vulnerabilities in most of them and so the claimed security level is not achieved. The scheme offered by Wan et al. recently is based on hierarchical identity-based encryption, in which the roaming user and the foreign network mutually authenticate each other without the help of the home network. Although the idea behind this proposal is interesting, it contradicts technical considerations such as routing and billing. The proposed protocol makes use of similar functions used in Wan et al.'s scheme but contributes a distinguished structure that overcomes the previous shortcomings and achieves a higher possible level of security in mobile roaming as well as enhancing the security of the key issuing procedure.

References

    1. 1)
      • Samfat, D., Movla, R., Asokan, N.: `Untraceability in mobile networks', ACM Mobicom'95, 1995, p. 26–36.
    2. 2)
      • M. Reed , P. Syverson , D. Goldschlag . Anonymous connections and onion routing. IEEE J. Select. Areas Commun. , 4 , 482 - 494
    3. 3)
      • Reed, M., Syverson, P., Goldschlag, D.: `Protocols using anonymous connections: mobile applications', 5thInt. Workshop Proc. Security Protocols, 1998, p. 13–23, (LNCS, 1361).
    4. 4)
      • Ardagna, C.A., Jajodia, S., Samarati, P., Stavrou, A.: `Privacy preservation over untrusted mobile networks', Privacy in location-based applications: research issues and emerging trends book contents, 2009, p. 84–105, (LNCS), Vol. 5599.
    5. 5)
      • Barbeau, M., Robert, J.M.: `Perfect identity concealment in UMTS over radio access links', IEEE Int. Conf. Wireless and Mobile Computing, Networking and Communications (WiMob'05), August 2005, p. 72–77.
    6. 6)
      • Juang, W.S., Wu, J.L.: `Efficient 3GPP authentication and key agreement with robust user privacy protection', Proc. IEEE Wireless Communications and Networking Conf. WCNC'07, 2007, p. 2720–2725.
    7. 7)
      • Kim, W.H., Yoon, E.J., Yoo, K.Y.: `A new authentication protocol providing user anonymity in open network', WINE'05, 2005, p. 414–423, (LNCS, 3828).
    8. 8)
      • Sattarzadeh, B., Asadpour, M., Jalili, R.: `Improved user identity confidentiality for UMTS mobile networks', Proc. Fourth European Conf. on Universal Multiservice Networks, 2007, p. 401–409.
    9. 9)
      • Go, J., Kim, K.: `Wireless authentication protocol preserving user anonymity', Symp. Cryptography and Information Security (SCIS 2001), 2001, p. 159–164.
    10. 10)
      • Y. Jiang , C. Lin , S. Shen , M. Shi . Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Trans. Wirel. Commun. , 9 , 2569 - 2577
    11. 11)
      • Yang, G., Wong, D.S., Deng, X.: `Efficient anonymous roaming and its security analysis', ACNS'05, 2005, p. 334–349, (LNCS, 3531).
    12. 12)
      • J. Zhu , J. Ma . A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. , 1 , 231 - 235
    13. 13)
      • Yang, G., Wong, D.S., Deng, X.: `Deposit-case attack against secure roaming', Tenth Australasian Conf. Information Security and Privacy (ACISP 2005), 2005, p. 417–428, (LNCS, 3574).
    14. 14)
      • Wan, Z., Ren, K., Preneel, B.: `A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks', First ACM Conf. on Wireless Network Security (WiSec'08), 2008.
    15. 15)
      • Horwitz, J., Lynn, B.: `Toward hierarchical identity-based encryption', Proc. EUROCRYPT'02, 2002, p. 466–481, (LNCS, 2332).
    16. 16)
      • Shamir, A.: `Identity-based cryptosystems and signature schemes', Advances in Cryptology: Crypto'84, 1985, p. 47–53, (LNCS, 196).
    17. 17)
      • Boneh, D., Franklin, M.: `Identity-based encryption from the weil pairing', Advances in Cryptology: Crypto'01, 2001, p. 213–229, (LNCS, 2139).
    18. 18)
      • Joux, A.: `The weil and tate pairings as building blocks for public key cryptosystems', Proc. Fifth Algorithmic Number Theory Symp.'02, 2002, p. 20–32, (LNCS, 2369).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0154
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0154
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address