Summary: | 博士 === 國立臺灣科技大學 === 電子工程系 === 101 === With the rise of a variety of networks and the improvement of bandwidth, communication applications over networks have grown hundreds of times than it was decade ago. Through different media, it is applied to wireless sensor networks, wireless access networks, mobile communication networks and so forth. In diversified applications, how to authenticate communication entities and build a secure and confidential connection over an insecure channel becomes a very important issue. Mutual authentication ensures that the legality of the message senders and the receivers on networks, allowing authorized users to access to limited resources, and also protects the service providers avoid attacks from illegal users. Considering security strength, communication cost and computing cost, different terminals adopt different cryptographic components. For example, in the same security strength, elliptic curve cryptosystem-based mutual authentication mechanisms are more efficient and more resource-saving in mobile communications. One way hash function-based mutual authentication mechanisms, which have the lowest computing complexity, are more applicable in electronic transactions on a wireless network such as wireless sensor networks and mobile commerce. The focus of this dissertation is in developing identity authentications to establish a secure communication. The research topics cover the following three: (a) authentication in wireless network environments (b) the master-slave architecture authentication protocol and (c) sensitive data protection mechanisms in smart phones.
First we propose suitable secure authentication protocols for wireless access networks and wireless sensor networks respectively. In wireless access networks, we utilize the advantage of elliptic curve cryptosystem, fast encryption and decryption, to propose a user anonymous authentication mechanism suitable for mobile devices. The proposed protocols not only improve the efficiency but also avoid the possible malicious attacks on the previous protocol such as a denial of service attack and a user identity trace attack. Moreover, in wireless sensor networks, we also propose an authentication protocol based on one way hash function. Since the proposed protocol only needs one way hash function and exclusive-or operations, compared to other protocols in wireless sensor networks, it is more practical and more efficient.
Subsequently, we further use the feature of one way hash function which has low computing complexity to propose a mutual identity authentication protocol for client-server architectures. According to reference materials, we analyze the possible attacks and propose an improvement under strict assumptions. Compared to other traditional authentication protocols, the proposed protocol can use more efficient computing cost to achieve the same or higher security strength.
Finally, in mobile networks, we focus on the popular terminals, android based smart phones, to propose a secure protection mechanism. The mechanism can protect sensitive data in smart cards effectively. Meanwhile, we refer to widely proposed smart card-based authentication protocols in recent years and integrate the proposed protection mechanism into related reference materials to enhance the whole security of the authentication mechanism.
|