透過您的圖書館登入
IP:18.224.38.3
  • 學位論文

無線蜂巢式網路中匿名認證協定之研究

Anonymous Authentication Protocols for Wireless Cellular Networks

指導教授 : 蔡育仁 王旭正

摘要


第二代行動通訊系統(GSM)已成為全球最廣泛使用的行動通信系統。目前的行動通訊系統業者為了達到高接通率及低阻斷率所以將很多認證協定機制關閉,這樣一來會造成攻擊者偽裝成合法使用者竊取服務和用戶資訊,以及其他衍生的問題等,如用戶身份隱私性和加解密計算的負荷與認證協定的運算。 在這篇論文的第3章裡,我們提供一個高效率以及用戶與網路端雙向認證的機制去解決ㄧ些現在及未來有可能發生的攻擊行為。本篇論文也為用戶提供匿名通訊的服務以達到身份隱藏的效果。在第三章後半段,我們分析所提出來的方法是否可以抵擋目前的攻擊。 這篇論文的第4章裡,我們改善Wang [37]所提出來的三個認證協定︰第一個是Call Set-up,第2個為用戶Hand-off時的認證協定,最後一個為匿名會議。我們利用Rabin加解密系統建造雙向認證機制的環境。藉由它的低計算量加密模式移動電話上裝並且為移動的用戶提供身分隱密性。在Hand-off過程中,我們提供此認證機制防止攻擊者偽裝成合法的基地台欺騙用戶端。最後匿名會議系統中,我們利用橢圓曲線加解密系統來分佈會議中的會議金鑰。在很多應用中,主持人不希望與會者所做的決定受到其他與會者的影響,如此可以利用匿名通訊來達到此要求。我們所提出來的方法就是用來解決這個問題。

並列摘要


The Global System for Mobile Communication (GSM) is widely regarded as the convenient digital mobile communication systems. However, many problems arise relating to data confidentiality, user privacy, and computational load. In the chapter 3 of this thesis, we provide some solutions to address problems, and do not change the GSM architecture. We also provide anonymous channel for user location privacy. One of our basic objects is to construct anonymous environment in wireless cellular networks and then we would apply it to the third generation mobile communication system or the novel communication system. In the chapter 4 of this thesis, three secure and anonymous authentication protocols are proposed for cellular mobile system: The first one is for call set-up, the second one is for hand-off, and last one is an anonymous call. We utilize the Rabin’s cryptosystem to construct a mutual authentication protocol on call set-up procedure. It can reduce computation load on mobile encrypting the message and provide mobile subscribers with user identity privacy. In hand-off procedure, we provide a protocol to protect mobile against BS spoofing. Finally, we construct a conference key distribution system based on Elliptic Curve Cryptosystem (ECC for short) [1]. In many applications, the attendees of a conference should be anonymous to each other (expect to the conference initiator who choose the attendees). Furthermore, we propose an anonymous conference protocol for mobile system.

參考文獻


[1] C.H. Lin, C.Y. Lee and W. Lee, “Comments on the Yang-Chang-Hwang Anonymous Conference Key Distribution System,” Computer Standards and Interfaces 26, pp. 171-174, 2004
[4] M. Rahnema, “Overview of the GSM System and Protocol Architecture,” IEEE Communications Magazine, vol. 31, pp. 92-100, 1993.
[5] A. Aziz and W. Diffie, “Privacy and Authentication for Wireless Local Area Networks,” IEEE, Personal Communications, vol. l, pp. 24-31, 1994.
[6] M.J. Beller, L.F. Chang, and Y. Yacobi, “Privacy and Authentication on A Portable Communications System,” IEEE Journal on Selected Areas in Communications, vol. 11, pp. 821-829, 1993.
[7] M.S. Hwang, and C.H. Hwang, “Authenticated Key-Exchange in Mobile Radio Network,” European Transactions on Telecommunications, Vol. 8, pp. 265-269, 1997.

延伸閱讀