Summary: | 博士 === 中興大學 === 資訊科學系所 === 95 === Since wireless communication is gaining popularity in recent years, people can roam freely and use the mobile service almost everywhere. Many mobile service systems, such as the Personal Communication Systems (PCS), the Global System of Mobile communications (GSM), and the Universal Mobile Communication System (UMTS), have been developed and have become very popular around the world. It brings so much convenience for people''s life that anyone can use it to communicate with anyone else in almost
any place at any time. However, people are most worried about two major security issues, namely, privacy and authentication. Privacy means the protection of the messages from interception or improper accesses. And, a good authentication system can guarantee that no unauthorized user is able to fraudulently obtain services from the wireless communication system. Therefore, how to build an efficient privacy and authentication for wireless communication systems is a critical challenge, and the proposed scheme is needed to reduce the overheads.
In this study, we discuss the characteristics
and requirements for privacy and authentication in wireless
communication systems. Furthermore, we propose four secure
and efficient methods for the four subjects: (1)authentication method based on pointer forwarding strategy, (2) authentication method for roaming mobile users, (3) privacy and authentication method for end-to-end mobile users, and (4) privacy and authentication method with anonymity. A frequently moving mobile
user in mobile communication must re-register at the home location register (HLR) frequently, and therefore the signaling traffic is overhead and HLR database update cost raised. In this study, we propose a new authentication protocol based on pointer forwarding to reduce the HLR update cost and traffic load for the authentication protocol. The proposed protocol for mobile communication can achieve our objectives described in below
section. Compared with other authentication protocols, our
protocol is significantly efficient. For the second subject, a new GSM authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) communication overhead between visitor location register (VLR); (b) huge bandwidth consumption between VLR and HLR; (c) storage space overhead in VLR; (d) overloaded in HLR with
authentication of mobile stations; and (e) not supporting
bilateral authentication. The main contribution of this method is that it does not only improve the drawbacks listed above but also fits the needs of roaming users. In addition, the proposed protocol does not change the existing architecture of GSM, and the robustness of the proposed protocol is the same as that of the original GSM, which is based on security algorithms $A3$, $A5$,
and $A8$.
For the third research subject, end-to-end security
scheme with end-user authentication is an important issue for wireless communications, and has attracted much research interest. We propose a privacy and authentication scheme for end-to-end mobile users in wireless communications. There are three goals in our scheme. The first allows two end-to-end mobile users to communicate privately each other. The second allows two end-to-end mobile users to distribute a session key simply. The
third allows two end-to-end mobile users to mutually authenticate. For the last research subject, we analyze and design an authentication scheme with anonymity for wireless environment. A good anonymity scheme must not only provide high security but also low computation. Firstly, we show that an authentication
scheme with anonymity has some security weaknesses. Hence, we design a secure and efficient authentication scheme with anonymity for wireless environment. Compare with the other schemes, this scheme is significantly simple and efficient. The proposed scheme has both low computation cost and low communication cost.
|