An Anonymous Authentication Protocol and Security Scheme of Mobile IP
碩士 === 中原大學 === 電機工程研究所 === 92 === Abstract In this thesis, we propose a new anonymous authentication protocol and security scheme for Mobile IP based on anonymous technique, symmetric key cryptosystem, and hierarchy structure. We will make an application of our scheme on optimized smooth handoff pa...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/yuv6af |
id |
ndltd-TW-092CYCU5442033 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092CYCU54420332018-06-25T06:06:10Z http://ndltd.ncl.edu.tw/handle/yuv6af An Anonymous Authentication Protocol and Security Scheme of Mobile IP MobileIP的匿名註冊協定與安全機制 Tsung-Hsien Huang 黃宗賢 碩士 中原大學 電機工程研究所 92 Abstract In this thesis, we propose a new anonymous authentication protocol and security scheme for Mobile IP based on anonymous technique, symmetric key cryptosystem, and hierarchy structure. We will make an application of our scheme on optimized smooth handoff path. We also make the comparison of performance among existent authentication protocols. The proposed new protocol not only improves shortcoming of existent Mobile IP authentication protocols but also reduces the load of authentication. In the process of designing mechanisms of authentication protocol for Mobile IP, we use anonymous technique to hide the role of the mobile node (MN). At first, according to this quality, we let the cost and complexity of hardware design to be enormously reduced. In addition, we employ hierarchy structure to make mutually authentications among home agent (HA), foreign agent (FA), and MN. It make authentication via the certificate authority (CA), the predecessor of FA (PFA). Using hierarchy structure, the loads of HA, FA and CA can be reduced. Hence, some extra steps will be added. Next, we use symmetric key cryptosystem to make the transport datagram more secure and avoid the invader to steal our information. In contrast, it has a drawback that it will increase capacity of datagram. Then, an example will be given to be an application of our scheme on optimized smooth handoff path. Finally the practical considerations for the application of our scheme will be described. Our proposed schemes can be separated into three phases that one stated as follows: In the phase one, the authentication of MN with HA is executed via FA. It employs symmetric key cryptosystem to achieve the identity authentication without even the spirits knowing about it. In the phase two, the legality of FA is checked by HA with hierarchy structure. In the same time, the legality of HA and MN is checked by FA with hierarchy structure in the phase three. The contributions of our new scheme are as follows: (1) Making the hardware and software design simpler The feature of our scheme is that the mechanism of authentication protocol is based on secret key system, bit-wise exclusive and operations are used to make the hardware and software design simpler. Hence, the whole overhead computation complexity and cost of MN are curtailed. (2) Hiding the identity of MN Anonymous authentication scheme can avoid expose the identity of MN. It also can reduce the chance for the invader to get the datagram of MN. It gets a batter performance secure communication than the existent authentication protocols of Mobil IP. (3) Improving confidentiality Three techniques are adopted to improve the confidentiality of our protocol. They are described as follows. (i)Anonymity is used to protect the data confidentiality. (ii)Ticket (T) and Certificated data (Cd) are used to promote the identity confidentiality. (iii)The random number is used to avoid reply attack and man-in-the-middle attack. (4) Integrating multi-techniques The techniques of hierarchical structure, secret key cryptography and anonymity are integrated to reach mutual authentication among all participators. We trust that the results of our research in this thesis will be much helpful to future research in the category of the authentication protocols of Mobile IP. Shih-Hsiung Twu 涂世雄 2004 學位論文 ; thesis 70 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 中原大學 === 電機工程研究所 === 92 === Abstract
In this thesis, we propose a new anonymous authentication protocol and security scheme for Mobile IP based on anonymous technique, symmetric key cryptosystem, and hierarchy structure. We will make an application of our scheme on optimized smooth handoff path. We also make the comparison of performance among existent authentication protocols. The proposed new protocol not only improves shortcoming of existent Mobile IP authentication protocols but also reduces the load of authentication.
In the process of designing mechanisms of authentication protocol for Mobile IP, we use anonymous technique to hide the role of the mobile node (MN). At first, according to this quality, we let the cost and complexity of hardware design to be enormously reduced. In addition, we employ hierarchy structure to make mutually authentications among home agent (HA), foreign agent (FA), and MN. It make authentication via the certificate authority (CA), the predecessor of FA (PFA). Using hierarchy structure, the loads of HA, FA and CA can be reduced. Hence, some extra steps will be added. Next, we use symmetric key cryptosystem to make the transport datagram more secure and avoid the invader to steal our information. In contrast, it has a drawback that it will increase capacity of datagram. Then, an example will be given to be an application of our scheme on optimized smooth handoff path. Finally the practical considerations for the application of our scheme will be described.
Our proposed schemes can be separated into three phases that one stated as follows:
In the phase one, the authentication of MN with HA is executed via FA. It employs symmetric key cryptosystem to achieve the identity authentication without even the spirits knowing about it. In the phase two, the legality of FA is checked by HA with hierarchy structure. In the same time, the legality of HA and MN is checked by FA with hierarchy structure in the phase three.
The contributions of our new scheme are as follows:
(1) Making the hardware and software design simpler
The feature of our scheme is that the mechanism of authentication protocol is based on secret key system, bit-wise exclusive and operations are used to make the hardware and software design simpler. Hence, the whole overhead computation complexity and cost of MN are curtailed.
(2) Hiding the identity of MN
Anonymous authentication scheme can avoid expose the identity of MN. It also can reduce the chance for the invader to get the datagram of MN. It gets a batter performance secure communication than the existent authentication protocols of Mobil IP.
(3) Improving confidentiality
Three techniques are adopted to improve the confidentiality of our protocol. They are described as follows.
(i)Anonymity is used to protect the data confidentiality.
(ii)Ticket (T) and Certificated data (Cd) are used to promote the identity confidentiality.
(iii)The random number is used to avoid reply attack and man-in-the-middle attack.
(4) Integrating multi-techniques
The techniques of hierarchical structure, secret key cryptography and anonymity are integrated to reach mutual authentication among all participators.
We trust that the results of our research in this thesis will be much helpful to future research in the category of the authentication protocols of Mobile IP.
|
author2 |
Shih-Hsiung Twu |
author_facet |
Shih-Hsiung Twu Tsung-Hsien Huang 黃宗賢 |
author |
Tsung-Hsien Huang 黃宗賢 |
spellingShingle |
Tsung-Hsien Huang 黃宗賢 An Anonymous Authentication Protocol and Security Scheme of Mobile IP |
author_sort |
Tsung-Hsien Huang |
title |
An Anonymous Authentication Protocol and Security Scheme of Mobile IP |
title_short |
An Anonymous Authentication Protocol and Security Scheme of Mobile IP |
title_full |
An Anonymous Authentication Protocol and Security Scheme of Mobile IP |
title_fullStr |
An Anonymous Authentication Protocol and Security Scheme of Mobile IP |
title_full_unstemmed |
An Anonymous Authentication Protocol and Security Scheme of Mobile IP |
title_sort |
anonymous authentication protocol and security scheme of mobile ip |
publishDate |
2004 |
url |
http://ndltd.ncl.edu.tw/handle/yuv6af |
work_keys_str_mv |
AT tsunghsienhuang ananonymousauthenticationprotocolandsecurityschemeofmobileip AT huángzōngxián ananonymousauthenticationprotocolandsecurityschemeofmobileip AT tsunghsienhuang mobileipdenìmíngzhùcèxiédìngyǔānquánjīzhì AT huángzōngxián mobileipdenìmíngzhùcèxiédìngyǔānquánjīzhì AT tsunghsienhuang anonymousauthenticationprotocolandsecurityschemeofmobileip AT huángzōngxián anonymousauthenticationprotocolandsecurityschemeofmobileip |
_version_ |
1718705411295543296 |