1 / 25

Secure Anonymous Authentication Scheme with Roaming for Mobile Networks

Secure Anonymous Authentication Scheme with Roaming for Mobile Networks. sPEAKER : Hong- Ji Wei Date: 2012-12-28. Outline. Introduction Review of Kim et al.’s Scheme Weakness of Kim et al.’s Scheme Our Improved Scheme Security Analysis Conclusion. 1. Introduction (1/2).

qabil
Download Presentation

Secure Anonymous Authentication Scheme with Roaming for Mobile Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Anonymous Authentication Scheme with Roaming for Mobile Networks sPEAKER: Hong-Ji Wei Date: 2012-12-28

  2. Outline Introduction Review of Kim et al.’s Scheme Weakness of Kim et al.’s Scheme Our Improved Scheme Security Analysis Conclusion

  3. 1. Introduction (1/2) Mun et al. proposed an anonymous authentication scheme with roaming for mobile networks on February, 2012. Unfortunately, Kim et al. pointed out that Mun et al.'s scheme contains two weaknesses which is replay attack and man-in-the-middle attack on July, 2012. In order to improve these weaknesses, they proposed an improved roaming authentication scheme with anonymity.

  4. 1. Introduction (2/2) In this paper, we analyze Kim et al.’s scheme and point out the weakness in existence. At the same time, we also propose an enhanced roaming authentication scheme to overcome the weakness of Kim et al.’s scheme.

  5. 2. Review of Kim et al.’s Scheme (1/5)

  6. 2. Review of Kim et al.’s Scheme (2/5) This scheme contains three main phases 1. Registration 2. Authentication and key establishment 3. Update session key

  7. 2. Review of Kim et al.’s Scheme (3/5) Registration MU HA Secure Channel Secure Channel

  8. 2. Review of Kim et al.’s Scheme (4/5) Authentication and key establishment MU FA HA

  9. 2. Review of Kim et al.’s Scheme (5/5) Update session key MU FA

  10. 3. Weakness of Kim et al.’s Scheme (1/3) The weakness of Kim et al.'s scheme can be found in two phases. 1. Authentication and establishment of session key 2. Update session key

  11. 3. Weakness of Kim et al.’s Scheme (2/3) Authentication and establishment of session key MU FA HA Replay attack

  12. 3. Weakness of Kim et al.’s Scheme (3/3) Update session key MU FA Replay attack

  13. 4. Our Improved Scheme (1/3) Registration MU HA Secure Channel Secure Channel

  14. 4. Our Improved Scheme (2/3) Authentication and establishment of session key MU FA HA

  15. 4. Our Improved Scheme (3/3) Update session key FA MU

  16. 5.Security Analysis (1/3) Authentication and establishment of session key MU FA HA Replay

  17. 5.Security Analysis (2/3) Update session key FA MU Replay

  18. 5.Security Analysis (3/3) Comparison table

  19. 6.Conclusion (1/1) In this paper, we propose an enhanced anonymous scheme to improve the weakness of replay attack in Kim et al.'s scheme. From the security analysis, we can know that our scheme indeed can prevent the replay attack in Authentication and establishment of session key and update session key phases.

  20. Q & A Many thanks for your listening

  21. Hong-Ji's Scheme (1/3) Registration MU HA Secure Channel Secure Channel

  22. Hong-Ji's Scheme (2/3) Authentication and key establishment MU FA HA

  23. Hong-Ji's Scheme (3/3) Update session key MU FA

  24. Hong-Ji's Scheme (2/3) Authentication and key establishment MU FA HA

  25. Hong-Ji's Scheme (3/3) Update session key MU FA

More Related