Summary: | 碩士 === 國立中興大學 === 資訊科學系所 === 95 === With the explosion of the Internet as well as the wireless and mobile communications in recent years, users have been presented with ever increasing opportunities to access network resources. Consequently, more and more attention is being paid to what can be termed ‘ubiquitous computing.’ Ubiquitous computing environment may consist of multiple networks either alone or in conjunction, such as WLANs, WPANs, Ad Hoc Networks, and 3Gs. In such environment, users have freedom to access resources and services anytime and anywhere. However, ubiquitous computing environment can be treacherous, and transferred messages can be easily copied and forged. In this situation user authentication becomes especially crucial. For users accessing services in ubiquitous computing environment, there are several problems concerning authentication and security that must be addressed. These include authentication efficiency, maintaining user anonymity, and the limited computational capacity of most mobile devices.
In this thesis, we focus on issues surrounding ubiquitous computing environment. First, we review previously authentication and authorization schemes and the IETF proposed Mobile IP protocol. We propose intra-domain and inter-domain access service authentication schemes, both of which maintain user anonymity in ubiquitous computing environment. Anonymity allows users to access services while avoiding revealing private individual information or exposing service contents and other information such as location, access time, types of services used. On the other hand, the inter-domain access service authentication scheme can provide fast re-authentication functionality that can shorten the delay in authentication. Furthermore, we employ hash functions and XOR operations to reduce the mobile devices’ overhead and to improve the authentication procedure.
|