Skip to main content
placeholder image

Anonymous and authenticated key exchange for roaming networks

Journal Article


Abstract


  • User privacy is a notable security issue in wireless

    communications. It concerns about user identities from being

    exposed and user movements and whereabouts from being

    tracked. The concern of user privacy is particularly signified

    in systems which support roaming when users are able to hop

    across networks administered by different operators. In this

    paper, we propose a novel construction approach of anonymous

    and authenticated key exchange protocols for a roaming user

    and a visiting server to establish a random session key in such

    a way that the visiting server authenticates the user’s home

    server without knowing exactly who the user is. A network

    eavesdropper cannot find out the user’s identity either (user

    anonymity). In addition, visited servers cannot track the roaming

    user’s movements and whereabouts even they collude with each

    other (user untraceability). Our construction approach is generic

    and built upon provably secure two-party key establishment

    protocols. Merits of our generic protocol construction include

    eliminating alias synchronization between the user and the

    home server, supporting joint key control, and not relying on

    any special security assumptions on the communication channel

    between the visiting server and the user’s home server. Our

    protocol can also be implemented efficiently. By piggybacking

    some message flows, the number of message flows between

    the roaming user and the visiting server is only three. As of

    independent interest, we describe a new practical attack called

    deposit-case attack and show that some previously proposed

    protocols are vulnerable to this attack.

Authors


  •   Yang, Guomin
  •   Wong, Duncan S. (external author)
  •   Deng, Xiaotie (external author)

Publication Date


  • 2007

Citation


  • Yang, G., Wong, D. S. & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6 (8), 3461-3472.

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3579

Number Of Pages


  • 11

Start Page


  • 3461

End Page


  • 3472

Volume


  • 6

Issue


  • 8

Place Of Publication


  • United States

Abstract


  • User privacy is a notable security issue in wireless

    communications. It concerns about user identities from being

    exposed and user movements and whereabouts from being

    tracked. The concern of user privacy is particularly signified

    in systems which support roaming when users are able to hop

    across networks administered by different operators. In this

    paper, we propose a novel construction approach of anonymous

    and authenticated key exchange protocols for a roaming user

    and a visiting server to establish a random session key in such

    a way that the visiting server authenticates the user’s home

    server without knowing exactly who the user is. A network

    eavesdropper cannot find out the user’s identity either (user

    anonymity). In addition, visited servers cannot track the roaming

    user’s movements and whereabouts even they collude with each

    other (user untraceability). Our construction approach is generic

    and built upon provably secure two-party key establishment

    protocols. Merits of our generic protocol construction include

    eliminating alias synchronization between the user and the

    home server, supporting joint key control, and not relying on

    any special security assumptions on the communication channel

    between the visiting server and the user’s home server. Our

    protocol can also be implemented efficiently. By piggybacking

    some message flows, the number of message flows between

    the roaming user and the visiting server is only three. As of

    independent interest, we describe a new practical attack called

    deposit-case attack and show that some previously proposed

    protocols are vulnerable to this attack.

Authors


  •   Yang, Guomin
  •   Wong, Duncan S. (external author)
  •   Deng, Xiaotie (external author)

Publication Date


  • 2007

Citation


  • Yang, G., Wong, D. S. & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6 (8), 3461-3472.

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/3579

Number Of Pages


  • 11

Start Page


  • 3461

End Page


  • 3472

Volume


  • 6

Issue


  • 8

Place Of Publication


  • United States