40 likes | 169 Vues
This paper presents a novel authentication scheme designed to ensure user anonymity in wireless environments. The proposed method leverages a series of cryptographic functions, including secure channel establishment and random number generation, to protect user identities. Key elements include a two-phase authentication process involving a mobile node (MN) and a foreign agent (FA), where unique identifiers and secure messages facilitate secure communication. This approach enhances user privacy while maintaining efficient authentication, making it suitable for consumer electronics in unsecured networks.
E N D
A New Authentication Scheme with Anonymity for Wireless Environments J. Zhu and J. Ma IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 230-234, 2004
Initial Assumptions HA MN PWMN N: random number PWMN=h(N||IDMN) r=h(N||IDHA) ⊕ h(N||IDMN) ⊕ IDHA ⊕ IDMN (secure channel) Smard card (r, IDHA, h)
First Phase HA MN FA n, (x0)L, IDHA, TMN b, n, (x0)L, TMN, CertFA, n=r ⊕ PWMN x0:random L=h(TMN ⊕ PWMN) TFA, EKRFA(h(above messages)) IDMN=h(N||IDHA) ⊕ n ⊕ IDHA Compute L and x0 c, EKUFA(h(IDMN)||x0), CertHA, THA, EKRHA(h(above and b)) (TCertMN)K k=h(IDMN) ⊕ x0
Second Phase When MN visits FA at i th session MN FA (TCertMN), (xi||TCertMN||other info.)ki ki=h(IDMN) ⊕ xi-1