透過您的圖書館登入
IP:3.141.41.187
  • 學位論文

建立適用於行動網路的匿名驗證方法之研究

A Research on Designing an Anonymous Mobility Network Authentication Scheme

指導教授 : 張雅芬

摘要


隨著網路科技與行動裝置的進步,使用者可以更輕易地透過行動裝置進行網路的存取。在2014年,Kuo等學者提出了應用在行動網路中的相互驗證方法並宣稱此方法是有效與安全的。在分析Kuo等學者的方法後,我們發現其有兩個缺點。第一,該方法無法抵禦中間人攻擊。第二,在該方法的密碼更新階段會遭遇到同步問題。在本研究中,將會詳細地介紹所發現的缺點、提出改善這些安全漏洞的方法,並對所提出之方法進行分析,證明此方法是安全且適用於行動網路環境中。

並列摘要


With the rapid advances of the network technologies and mobile devices, users can easily use their mobile devices to access Internet services through wireless networks. In 2014, Kuo et al. proposed a mobility network authentication scheme and claimed their scheme was efficient and secure. Unfortunately, we find that their scheme has two weaknesses. First, it cannot resist man-in-the-middle attack. Second, it suffers from the synchronization problem in password change phase. In this study, the found weaknesses will be shown in detail, and an improved scheme for mobility networks is proposed to remedy these weaknesses. We also analyze the proposed scheme and prove that our scheme is secure and suitable for mobility networks.

參考文獻


[1] S. Suzukiz and K. Nakada, “An authentication techinque based on distributed security management for the global mobility network,” IEEE Jounal Selected Areas in Communications, vol. 15, no. 8, pp. 1608-1617, 1997.
[2] L. Buttyan, C. Gbaguidi, S. Staamann and U. Wilhelm, “Extensions to an authentication technique proposed for the global mobility network,” IEEE Transactions on Communications, vol. 48, no. 3, pp. 373-376, 2000.
[3] Z.J. Tzeng and W.G. Tzeng, “Authentication of mobile users in third generation mobile systems,” Wireless Personal Communications, vol. 16, no. 1, pp. 35-50, 2001.
[4] K.F. Hwang and C.C Chang, “A self-encryption mechanism for authentication of roaming and teleconference services,” IEEE Transactions on Wireless Communications, vol. 2, no. 2, pp. 400-407, 2003.
[5] J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 230-234, 2004.

延伸閱讀