透過您的圖書館登入
IP:52.14.1.136
  • 學位論文

在無線通訊系統中混沌系統應用於安全認證方法之研究

Study on Chaos Systems of Secure Authentication Schemes for Wireless Communications

指導教授 : 陳永隆
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來雲端計算成為一個最重要的議題之一,雲端計算提供一個讓使用者可以有效的存取使用各地的數據、整合分散式的資源為使用者提供服務的方法,使用者所需要使用的服務或是應用軟體都建置在雲端上,只要使用任何可以聯網的無線通訊設備或是電腦的瀏覽器,使用者都可以隨時存取及使用雲端計算提供的服務。因此,在雲端計算裡安全性便成為一個很重要的議題,例如存取控制、身分管理、應用程式的安全、以及授權認證方式等等。本篇論文提出在雲端計算以及無線通訊技術方面使用混沌系統加密結合Arnold Cat Map運算的認證方式,來強化Wu等學者所提出的無線通訊認證方法,以及加強提供給遠端使用者認證的橢圓曲線加密認證方式的安全性。在Wu 等學者所提出的無線通訊認證方法中存在著無法達到完全匿名認證的安全性問題,而使用橢圓曲線加密認證遠端使用者認證方式仍然會受到不同的攻擊。我們提出的方法是以混沌系統的狀態作為加密的參數,混沌系統其中一個特性是系統的發展取決於初始的條件值,初始條件值的微小差異會對系統產生很大的影響,因此利用此特性我們提出的混沌系統加密方式,並結合使用Arnold Cat Map運算的方式,將傳遞的認證訊息變為更為複雜,更不容易被破解。因此我們提出可以讓使用者在與雲端伺服器及在無線通訊相互認證方面更為安全的認證方式。

並列摘要


In recent years, cloud computing is one of the most important subjects. Cloud computing provides a way that allows efficient use the global data, distributed resources and services to clients. Those associative services and applications based on demand of clients on the software or platform. People can access a cloud using any mobile device or web browser. Some security issues have become more important, such as access control, identity management, application security and authentication. In this paper, we focus on the security of authentication in the cloud computing and wireless communication environment. We proposed the authentication process in the wireless communications with an encrypted scheme of chaos system, an ID-based remote mutual authentication with key agreement scheme on ECC and chaos system for cloud computing. The Wu et al.’s scheme has security problems about the property of full anonymity in wireless communications. The weakness of Wu et al.’s scheme allow an attacker allow an attacker to the authentication process in the wireless communications have the opportunity to steal legitimate user's identity information. Elliptic curve cryptosystem (ECC) has been used for remote user authentication schemes to reduce the computation loads for mobile devices. However, the most remote user authentication schemes based on ECC still are vulnerable to different attacks. Our scheme uses the states of chaos system as parameters in encryption function to enhance the Wu et al.’s scheme. One feature of a chaos system is its dependence on the initial condition. A small change in the initial conditions can have major long-term effects on system behavior. The scheme uses a chaos sequence and adds to authentication messages. Authentication messages are shuffled using an Arnold cat map to improve the security of authentication for wireless communications and clouding computing. The proposed scheme provides mutual authentication and session key agreement between the users and the cloud servers. Furthermore, security analysis shows our scheme is more secure for cloud computing.

參考文獻


[1] J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Trans. Consumer Electron., vol. 50, no. 1, pp. 230-234, Feb. 2004.
[2] P. Popovski, and O. Simeone, “Wireless secrecy in cellular systems with infrastructure-aided cooperation,” IEEE Trans. Inf. Forensic Secur., vol. 4, no. 2, pp. 242-256, Jun. 2009.
[3] W. Gu, S. Chellappan, X. Bai, and H. Wang, “Scaling laws of key predistribution protocols in wireless sensor networks,” IEEE Trans. Inf. Forensic Secur., vol. 6, no. 4, pp. 1370-1381, Dec. 2011.
[4] C. I. Fan, and Y. H. Lin., “Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics,” IEEE Trans. Inf. Forensic Secur., vol. 4, no. 4, pp. 933-945, Dec. 2009.
[5] C. C. Wu, W. B. Lee, and W. J. Tsaur, “A secure authentication scheme with anonymity for wireless communications,” IEEE Commun. Lett., vol. 12, no. 10, pp. 722-723, Oct. 2008.

延伸閱讀