Source : IEEE Access, In Press, 2016

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.
1 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Authors : Han-Cheng Hsiang and Wei-Kuan Shih.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
1 Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol 李添福 (Tian-Fu Lee) 國立成功大學資訊工程博士 Cryptography/ Network security/ Wireless.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
Password-based user authentication and key distribution protocols for client-server applications Authors: Her-Tyan Yeh and Hung-Min Sun Sources: The Journal.
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Smart Card Based Authenticated Key Agreement Schemes
Lightweight Mutual Authentication for IoT and Its Applications
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Proxy Blind Signature Scheme
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Anonymous Wireless Authentication on a Portable Cellular Mobile System
Efficient Time-Bound Hierarchical Key Assignment Scheme
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Privacy Preserving Ranked Multi-Keyword
Authors : Parwinder Kaur Dhillon and Sheetal Kalra
QR Code Authentication with Embedded Message Authentication Code
Chair Professor Chin-Chen Chang Feng Chia University
Source : IEEE Access, Vol. 6, pp , Jan. 2018
Amar B. Patel , Shushan Zhao
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Lightweight IoT-based authentication scheme in cloud computing circumstance Source: Future Generation Computer Systems Volume 91, February 2019, Pages.
Security and Privacy in Pervasive/Ubiquitous Computing Systems
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
An Improved Novel Key Management Protocol for RFID Systems
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Source: Computer Networks Volume 149, 11 February 2019, Pages 29-42
Improvement of Chien et al
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography Source : IEEE Access, In Press, 2016 Authors : Alavalapati Goutham Reddy, Ashok Kumar Das, Eun-Jun Yoon and Kee-Young Yoo Speaker : Hsiao-Ling Wu Date: 2016/11/10

Outline Proposed scheme Security analysis Performance analysis Conclusions

Proposed scheme(1/6) Notations

Proposed scheme(2/6) Mobile user registration phase HA MU Input IDMU, PWMU Choose b AMU=h(PWMU || b) PIDMU=h(IDMU || b) PWIDMU=h(IDMU || PWMU) PIDMU BMU=h(PIDMU || MSK) CMU=h(PIDMU || BMU) RL=zP Secure channel {IDHA, BMU, CMU, RL, h(.), P} Secure channel DMU=b ⊕ PWIDMU EMU= BMU ⊕ AMU {IDHA, CMU, DMU, EMU, RL, h(.), P}

Proposed scheme(3/6) Mutual authentication with key-agreement phase MU {IDHA, CMU, DMU, EMU, RL, h(.), P} FA Generate random x RM = xP RM’ = xRL AIDMU = PIDMU ⊕ RM’ K= h(BMU || RM’) M1 = h(K ||IDFA|| PIDMU) MMH ={IDHA, AIDMU, M1, RM, P}

Proposed scheme(4/6) Mutual authentication with key-agreement phase HA FA HA Generate random y RB = yP M2 = h(KFH || RB || MMH) MFH ={MMH, RB, IDFA, M2}

Proposed scheme(5/6) Mutual authentication with key-agreement phase FA {IDHA, CMU, DMU, EMU, RL, h(.), P} HA MFH ={MMH, RB, IDFA, M2} RM’ = zRM PIDMU = AIDMU ⊕ RM’ BMU=h(PIDMU || MSK) K= h(BMU || RM’) M1 ?= h(K ||IDFA|| PIDMU) KFH = h(IDFA|| FSK) M2 ?= h(KFH || RB || MMH) M3 = h(IDHA || KFH || RM) M4 = h(IDHA || IDFA|| BMU|| RB ) M3 , M4

Proposed scheme(6/6) Mutual authentication with key-agreement phase MU {IDHA, CMU, DMU, EMU, RL, h(.), P} FA M3 ?= h(IDHA || KFH || RM) RB’ = yRM SK= h(RB’ ||IDHA || IDFA) M5 = h(SK || M4) M4 , M5, RB M4 ?= h(IDHA || IDFA|| BMU|| RB ) RB’ = xRB SK= h(RB’ ||IDHA || IDFA) M5 ?= h(SK || M4) M6 = h(SK || IDFA ||IDHA ) M6 M6 ?= h(SK || IDFA ||IDHA )

Security analysis SR1: the mutual authentication between tag and server SR2: strong anonymity, which is the combination of the tag anonymity and untraceability SR3: it can resolve the issue of de-synchronization SR4: the adversary cannot acquire Kts from Ktsnew SR5: To authenticate the RFID tag, the server in the RFID system has to find matching records from its database. If the computational workload of the searching algorithm increases significantly as the number of RFID tags increases, the system will not scale. 3. If a group of tags share the same key and use it for authentication, then it is vulnerable to cloning(複製) attacks.

Performance analysis [16] I. Memon, I. Hussain, R. Akhtar, and G. Chen, ``Enhanced privacy and authentication: An efcient and secure anonymous communication for location based service using asymmetric cryptography scheme,'' Wireless Pers. Commun., vol. 84, no. 2, pp. 14871508, 2015. [17] H. Mun, K. Han, Y. S. Lee, C. Y. Yeun, and H. H. Choi, ``Enhanced secure anonymous authentication scheme for roaming service in global mobility networks,'' Math. Comput. Model., vol. 55, no. 1, pp. 214222, 2012. [20] Q. Xie, B. Hu, X. Tan, M. Bao, and X. Yu, ``Robust anonymous two-factor authentication scheme for roaming service in global mobility network,'‘ Wireless Pers. Commun., vol. 74, no. 2, pp. 601614, 2014. [22] D. Zhao, H. Peng, L. Li, and Y. Yang, ``A secure and effective anonymous authentication scheme for roaming service in global mobility networks,'‘ Wireless Pers. Commun., vol. 78, no. 1, pp. 247269, 2014.

Conclusions High security level Lightweight