1 / 20

Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Date : 2012.10.24 Reporter : Hong Ji Wei Authors : Jun-Sub Kim and Jin Kwak From : International Journal of Security and Its Applications Vol. 6, No. 3, July, 2012. INTRODUCTION. 1.

barny
Download Presentation

Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date:2012.10.24 Reporter : Hong Ji Wei Authors : Jun-Sub Kim and Jin Kwak From : International Journal of Security and Its Applications Vol. 6, No. 3, July, 2012

  2. INTRODUCTION 1 REVIEW OF MUN’S SCHEME 2 WEAKNESS OF MUN’S SCHEME 5 3 3 3 IMPROVED SCHEME CONCLUSION 6 4 4 4 OUTLINE SECURITY ANALYSIS

  3. INTRODUCTION • Lee, Hwang and Liao pointed out some security weaknes- sesin Zhu-Ma’s scheme and presented an improved scheme in 2006. • Wu, Lee and Tsaur pointed out that Leeet al.'s scheme doesn’t achieve all security properties in 2008. • Mun et al. pointed out some security weaknesses in Wuet al.'s scheme and proposed the new improved scheme in 2012. • Kim et al. pointed out that Munet al.'sscheme exist security problems of replay attack and man-in-the-middle attack. So they proposed the new improved scheme in 2012.

  4. REVIEW OF MUN’S SCHEME • Registration HA MU Secure Channel Secure Channel

  5. REVIEW OF MUN’S SCHEME • Authentication and establishment of session key FA HA MU

  6. REVIEW OF MUN’S SCHEME • Update session key FA MU 5

  7. WEAKNESS OF MUN’S SCHEME • Replay attack FA HA MU

  8. WEAKNESS OF MUN’S SCHEME • Man-in-the-middle attack FA HA MU SFA ,a’P ,PFA=(SHA||IDFA||NFA) SMF’ ,b’P 7

  9. IMPROVED SCHEME • Registration MU HA Secure Channel

  10. IMPROVED SCHEME • Authentication and establishment of session key FA HA MU 9

  11. IMPROVED SCHEME • Update session key FA MU 10

  12. SECURITYANALYSIS • Anonymity FA HA MU 11

  13. SECURITYANALYSIS • Provide perfect forward secrecy MU FA

  14. SECURITYANALYSIS • Prevent replay attack FA HA MU 13

  15. SECURITYANALYSIS • Provide mutual authentication between MU and HA FA HA MU 14

  16. SECURITYANALYSIS • Provide mutual authentication between MU and FA FA HA MU 15

  17. SECURITYANALYSIS • Prevent man-in-the-middle attack FA HA MU

  18. SECURITYANALYSIS

  19. CONCLUSION • In this paper, we discussed the security weaknesses in Mun et al.’s scheme, such as a vulnerability to replay attacks and man-in-the-middle attacks. • The scheme achieves many security problems 1.Anonymity 2.Provides perfect forward secrecy 3.Mutual authentication 4.Prevent replay attacks 5.Prevent Man-in-the-middle attacks.

  20. Thank You !

More Related