An Anonymous Authentication Protocol and Security Scheme of Mobile IP

碩士 === 中原大學 === 電機工程研究所 === 92 === Abstract In this thesis, we propose a new anonymous authentication protocol and security scheme for Mobile IP based on anonymous technique, symmetric key cryptosystem, and hierarchy structure. We will make an application of our scheme on optimized smooth handoff pa...

Full description

Bibliographic Details
Main Authors: Tsung-Hsien Huang, 黃宗賢
Other Authors: Shih-Hsiung Twu
Format: Others
Language:en_US
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/yuv6af
id ndltd-TW-092CYCU5442033
record_format oai_dc
spelling ndltd-TW-092CYCU54420332018-06-25T06:06:10Z http://ndltd.ncl.edu.tw/handle/yuv6af An Anonymous Authentication Protocol and Security Scheme of Mobile IP MobileIP的匿名註冊協定與安全機制 Tsung-Hsien Huang 黃宗賢 碩士 中原大學 電機工程研究所 92 Abstract In this thesis, we propose a new anonymous authentication protocol and security scheme for Mobile IP based on anonymous technique, symmetric key cryptosystem, and hierarchy structure. We will make an application of our scheme on optimized smooth handoff path. We also make the comparison of performance among existent authentication protocols. The proposed new protocol not only improves shortcoming of existent Mobile IP authentication protocols but also reduces the load of authentication. In the process of designing mechanisms of authentication protocol for Mobile IP, we use anonymous technique to hide the role of the mobile node (MN). At first, according to this quality, we let the cost and complexity of hardware design to be enormously reduced. In addition, we employ hierarchy structure to make mutually authentications among home agent (HA), foreign agent (FA), and MN. It make authentication via the certificate authority (CA), the predecessor of FA (PFA). Using hierarchy structure, the loads of HA, FA and CA can be reduced. Hence, some extra steps will be added. Next, we use symmetric key cryptosystem to make the transport datagram more secure and avoid the invader to steal our information. In contrast, it has a drawback that it will increase capacity of datagram. Then, an example will be given to be an application of our scheme on optimized smooth handoff path. Finally the practical considerations for the application of our scheme will be described. Our proposed schemes can be separated into three phases that one stated as follows: In the phase one, the authentication of MN with HA is executed via FA. It employs symmetric key cryptosystem to achieve the identity authentication without even the spirits knowing about it. In the phase two, the legality of FA is checked by HA with hierarchy structure. In the same time, the legality of HA and MN is checked by FA with hierarchy structure in the phase three. The contributions of our new scheme are as follows: (1) Making the hardware and software design simpler The feature of our scheme is that the mechanism of authentication protocol is based on secret key system, bit-wise exclusive and operations are used to make the hardware and software design simpler. Hence, the whole overhead computation complexity and cost of MN are curtailed. (2) Hiding the identity of MN Anonymous authentication scheme can avoid expose the identity of MN. It also can reduce the chance for the invader to get the datagram of MN. It gets a batter performance secure communication than the existent authentication protocols of Mobil IP. (3) Improving confidentiality Three techniques are adopted to improve the confidentiality of our protocol. They are described as follows. (i)Anonymity is used to protect the data confidentiality. (ii)Ticket (T) and Certificated data (Cd) are used to promote the identity confidentiality. (iii)The random number is used to avoid reply attack and man-in-the-middle attack. (4) Integrating multi-techniques The techniques of hierarchical structure, secret key cryptography and anonymity are integrated to reach mutual authentication among all participators. We trust that the results of our research in this thesis will be much helpful to future research in the category of the authentication protocols of Mobile IP. Shih-Hsiung Twu 涂世雄 2004 學位論文 ; thesis 70 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 中原大學 === 電機工程研究所 === 92 === Abstract In this thesis, we propose a new anonymous authentication protocol and security scheme for Mobile IP based on anonymous technique, symmetric key cryptosystem, and hierarchy structure. We will make an application of our scheme on optimized smooth handoff path. We also make the comparison of performance among existent authentication protocols. The proposed new protocol not only improves shortcoming of existent Mobile IP authentication protocols but also reduces the load of authentication. In the process of designing mechanisms of authentication protocol for Mobile IP, we use anonymous technique to hide the role of the mobile node (MN). At first, according to this quality, we let the cost and complexity of hardware design to be enormously reduced. In addition, we employ hierarchy structure to make mutually authentications among home agent (HA), foreign agent (FA), and MN. It make authentication via the certificate authority (CA), the predecessor of FA (PFA). Using hierarchy structure, the loads of HA, FA and CA can be reduced. Hence, some extra steps will be added. Next, we use symmetric key cryptosystem to make the transport datagram more secure and avoid the invader to steal our information. In contrast, it has a drawback that it will increase capacity of datagram. Then, an example will be given to be an application of our scheme on optimized smooth handoff path. Finally the practical considerations for the application of our scheme will be described. Our proposed schemes can be separated into three phases that one stated as follows: In the phase one, the authentication of MN with HA is executed via FA. It employs symmetric key cryptosystem to achieve the identity authentication without even the spirits knowing about it. In the phase two, the legality of FA is checked by HA with hierarchy structure. In the same time, the legality of HA and MN is checked by FA with hierarchy structure in the phase three. The contributions of our new scheme are as follows: (1) Making the hardware and software design simpler The feature of our scheme is that the mechanism of authentication protocol is based on secret key system, bit-wise exclusive and operations are used to make the hardware and software design simpler. Hence, the whole overhead computation complexity and cost of MN are curtailed. (2) Hiding the identity of MN Anonymous authentication scheme can avoid expose the identity of MN. It also can reduce the chance for the invader to get the datagram of MN. It gets a batter performance secure communication than the existent authentication protocols of Mobil IP. (3) Improving confidentiality Three techniques are adopted to improve the confidentiality of our protocol. They are described as follows. (i)Anonymity is used to protect the data confidentiality. (ii)Ticket (T) and Certificated data (Cd) are used to promote the identity confidentiality. (iii)The random number is used to avoid reply attack and man-in-the-middle attack. (4) Integrating multi-techniques The techniques of hierarchical structure, secret key cryptography and anonymity are integrated to reach mutual authentication among all participators. We trust that the results of our research in this thesis will be much helpful to future research in the category of the authentication protocols of Mobile IP.
author2 Shih-Hsiung Twu
author_facet Shih-Hsiung Twu
Tsung-Hsien Huang
黃宗賢
author Tsung-Hsien Huang
黃宗賢
spellingShingle Tsung-Hsien Huang
黃宗賢
An Anonymous Authentication Protocol and Security Scheme of Mobile IP
author_sort Tsung-Hsien Huang
title An Anonymous Authentication Protocol and Security Scheme of Mobile IP
title_short An Anonymous Authentication Protocol and Security Scheme of Mobile IP
title_full An Anonymous Authentication Protocol and Security Scheme of Mobile IP
title_fullStr An Anonymous Authentication Protocol and Security Scheme of Mobile IP
title_full_unstemmed An Anonymous Authentication Protocol and Security Scheme of Mobile IP
title_sort anonymous authentication protocol and security scheme of mobile ip
publishDate 2004
url http://ndltd.ncl.edu.tw/handle/yuv6af
work_keys_str_mv AT tsunghsienhuang ananonymousauthenticationprotocolandsecurityschemeofmobileip
AT huángzōngxián ananonymousauthenticationprotocolandsecurityschemeofmobileip
AT tsunghsienhuang mobileipdenìmíngzhùcèxiédìngyǔānquánjīzhì
AT huángzōngxián mobileipdenìmíngzhùcèxiédìngyǔānquánjīzhì
AT tsunghsienhuang anonymousauthenticationprotocolandsecurityschemeofmobileip
AT huángzōngxián anonymousauthenticationprotocolandsecurityschemeofmobileip
_version_ 1718705411295543296