透過您的圖書館登入
IP:3.145.184.117
  • 學位論文

行動通訊環境中植基於Humancrypt的使用者身份認證協定

Humancrypt- Based User Authentication Protocol for Mobile Communication

指導教授 : 廖冠捷
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


由於科技不斷進步,人們對於行動服務的需求大幅提高,因此其背後也隱藏了相當龐大的商機與利益,所以各家系統業者與學者紛紛開始在此架構上做了許多的研究與努力,其目的無非都是為了提供更加完備的服務與更為安全的使用環境。 伴隨著科技的腳步,行動裝置的使用習慣也從單純的語音傳遞,進化到大量的行動上網需求。不過考慮到在開放的環境下無線電波傳輸時面臨的可能風險,使得資訊安全與個人隱私的保護等議題更加倍受關注。 然而,由於在現行的行動網路的身份驗證技術中,所有的驗證結果都只是成功與否等單純的訊息回應。整個過程對於使用者而言並沒有實際參與其中,充其量只不過是被動地接受行動硬體設備所作的所有判斷。這也呼應了2002年日本學者Imai所提出的Humancrypt概念,即所有的密碼技術相關應用都應該要將使用者與硬體設備間的互動與關聯納入設計考量的範疇,畢竟「科技始終來自於人性。」 有鑑於此,本篇論文企圖將Humancrypt的概念引入行動網路的身份驗證技術中,配合二維條碼技術讓行動設備使用者可以直接判讀其所在地區服務基地台之相關資訊。如此一來,由於使用者實際融入並參與整個身份驗證的過程,即大幅增加了使用者於人機互動時的信任與認同。 除此之外,在我們的方法中甚至還能進一步妥善利用二維條碼的其他儲存空間,將使用者所在地區所提供的行動商務服務項目、服務範圍、相關優惠…等各式行銷資訊,合併於驗證結果訊息中一起傳送。不但豐富了整個行動商務的應用層面,更蘊藏龐大的商機與無限的可能。

並列摘要


With the rapid development of the information technology, people’s demand for the mobile services increases dramatically. Here goes along with the opportunity and interest. For this reason, amounts of mobile service providers and scholars start to research on this topic in order to provide a more complete and secure user platform. Because of the progress of technology, users utilize the mobile service to surf on the internet instead of merely voice transmission. However, there might be risk to transmit the radio wave in open environments, so the issues about information security and privacy protection have received much concern. However, the results of the mobile network authentication protocols nowadays are just a simple message response, Yes or No. Thus, instead of taking part in the authentication procedures, users only receive the hardware’s judgment passively. This is inspired by the concept of the Humancrypt proposed by Japanese scholars, Imai. It says that the applications of cryptographic techniques must take account of the relation between human and computer; otherwise it is difficult to promote security applications for human use. In the final analysis “Technology is connecting to people”. Therefore, this thesis attempts to introduce the concept of the Humancrypt into the mobile network authentication technology, and it allows users can directly interpret the related information of the service base station with QR code. In this way, users are actually participated in the verification process. It greatly increases users’ confidence in the man-machine interactions. In addition, the rest storage of QR code in our method can be used further and well. We can transmit the identified results combined with any kinds of marketing information about the mobile service, service range and related preferences. It not only enriches the application of the whole mobile service but also increases the opportunity and interest.

參考文獻


[7] C. H. Lee, M. S. Hwang, and W. P. Yang, “Enhanced Privacy and Authentication for the Global System for Mobile Communications,” Wireless Networks, vol. 5, pp. 231- 243, 1999.
[9] C. C. Chang, J. S. Lee, and Y. F. Chang, “Efficient Authentication Protocols of GSM,” Computer Communications, vol. 28, pp. 921- 928, 2005.
[10] C. Xenakis and L. Merakos, “Security in Third Generation Mobile Networks,” Computer Communications, vol. 27, no. 7, pp. 638- 650, 2004.
[11] C. F. Grecas, S. I. Maniatis, and I. S. Venieris, “Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration,” Mobile Networks and Applications, vol. 8, no. 2, pp. 145- 150, Apr. 2003.
[12] C. M. Huang and J. W. Li, “Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption,” IEEE Proceedings of the 19th International Conference on Advanced Information Networking and Applications(AINA'05), vol. 1 (AINA papers), pp. 392- 397, Mar. 2005.

延伸閱讀