Download presentation
Presentation is loading. Please wait.
Published byMoses Flowers Modified over 9 years ago
1
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : 2012.10.24 Reporter : Hong Ji Wei Authors : Jun-Sub Kim and Jin Kwak From : International Journal of Security and Its Applications Vol. 6, No. 3, July, 2012
2
多媒體網路安全實驗室 OUTLINE INTRODUCTION 1 REVIEW OF MUN’S SCHEME 2 WEAKNESS OF MUN’S SCHEME 33 IMPROVED SCHEME 44 35 1 SECURITY ANALYSIS CONCLUSION 46
3
多媒體網路安全實驗室 INTRODUCTION 2 Lee, Hwang and Liao pointed out some security weaknes- ses in Zhu-Ma’s scheme and presented an improved scheme in 2006. Wu, Lee and Tsaur pointed out that Lee et al.'s scheme doesn’t achieve all security properties in 2008. Mun et al. pointed out some security weaknesses in Wu et al.'s scheme and proposed the new improved scheme in 2012. Kim et al. pointed out that Mun et al.'s scheme exist security problems of replay attack and man-in-the-middle attack. So they proposed the new improved scheme in 2012.
4
多媒體網路安全實驗室 Registration MU HA Secure Channel REVIEW OF MUN’S SCHEME
5
多媒體網路安全實驗室 4 Authentication and establishment of session key MU FAHA REVIEW OF MUN’S SCHEME
6
多媒體網路安全實驗室 5 Update session key MU FA REVIEW OF MUN’S SCHEME
7
多媒體網路安全實驗室 6 Replay attack MU FAHA WEAKNESS OF MUN’S SCHEME
8
多媒體網路安全實驗室 7 7 Man-in-the-middle attack MU FAHA WEAKNESS OF MUN’S SCHEME S FA,a’P,P FA =(S HA ||ID FA ||N FA ) S MF ’,b’P
9
多媒體網路安全實驗室 8 Registration MUHA IMPROVED SCHEME Secure Channel
10
多媒體網路安全實驗室 9 9 Authentication and establishment of session key MU FA HA IMPROVED SCHEME
11
多媒體網路安全實驗室 10 Update session key MU FA IMPROVED SCHEME
12
多媒體網路安全實驗室 SECURITY ANALYSIS Anonymity 11 MU FA HA
13
多媒體網路安全實驗室 12 Provide perfect forward secrecy SECURITY ANALYSIS MUFA
14
多媒體網路安全實驗室 Prevent replay attack 13 SECURITY ANALYSIS MU FA HA
15
多媒體網路安全實驗室 Provide mutual authentication between MU and HA SECURITY ANALYSIS 14 MU FA HA
16
多媒體網路安全實驗室 Provide mutual authentication between MU and FA SECURITY ANALYSIS 15 MU FA HA
17
多媒體網路安全實驗室 16 Prevent man-in-the-middle attack SECURITY ANALYSIS MU FA HA
18
多媒體網路安全實驗室 17 SECURITY ANALYSIS
19
多媒體網路安全實驗室 CONCLUSION In this paper, we discussed the security weaknesses in Mun et al.’s scheme, such as a vulnerability to replay attacks and man-in-the-middle attacks. The scheme achieves many security problems 1.Anonymity 2.Provides perfect forward secrecy 3.Mutual authentication 4.Prevent replay attacks 5.Prevent Man-in-the-middle attacks. 18
20
多媒體網路安全實驗室
21
20 Registration MUHA OUR IMPROVED SCHEME Secure Channel
22
多媒體網路安全實驗室 21 Authentication and establishment of session key MU FA HA OUR IMPROVED SCHEME
23
多媒體網路安全實驗室 22 Update session key MUFA OUR IMPROVED SCHEME
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.