簡易檢索 / 詳目顯示

研究生: 謝明德
Duc, Ta Minh
論文名稱: 一個新的移動式通訊雙向認證協定
A new mutual authentication protocol for mobile communication
指導教授: 黃宗立
Hwang, Tzone-Lih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 49
中文關鍵詞: 認證全球行動通訊系統行動通訊安全性
外文關鍵詞: Authentication, GSM, Mobile communications, security
相關次數: 點閱:175下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 中文摘要
    現今,隨著通訊技術的快速發展,許多廣受歡迎的服務皆植基於這些先進技術的優勢被開發出來,其中一個受歡迎的服務就是無線通訊。無所不在的無線網路允許分散在各處的行動使用者們無論在任何時間和地點都能有效率地互相通訊,即使是在移動的狀態之下也能進行通訊。此外,小型且精密的行動電話也大幅提升了行動裝置的可攜性。基於快速移動及高可攜性的特色,使得無線通訊在個人通訊的活動裡扮演著極為重要的角色。
    在過去的文獻裡,有許多關於行動通訊安全的協定被提出。在這些協定當中,驗證是非常重要的項目,因為它是抵禦攻擊者的第一道防線,確保每個成員在通訊過程的正確性。因此,一些高效率的安全協定也被相繼提出。然而,這些協定並不適合目前行動通訊系統的環境。而且,部分的協定存在相同的缺點,例如行動使用者與系統之間通訊時的高運算量及高傳輸成本。為考量行動使用者僅具備低運算及低通訊能力的條件下,其認證協定需要更進一步改善。
    在本論文中,我們植基於Hwang和Chang的協定提出了一個改進方法,解決VLRs與HLR進行認證時,需要時間同步的基本假設。另外,本改進方法不僅達到雙向認證,相較於現存的協定,例如Hwang和Chang的協定[2],及Fan等人的協定[1],我們的方法也大幅減少行動使用者的運算量及通訊成本。
    關鍵字: 認證,全球行動通訊系統,行動通訊,安全性

    Abstract
    Abstract- Nowadays, according to the fast progress of communication technologies, there are so many services have been developed in literature to take the advantages of these communication technologies. Among these services, wireless communication is the most important one. Wireless communication is playing an important role in human communication activities by holding the features of mobility and usability. There were many security mechanisms for mobile communications that had been proposed in the past. In these mechanisms, the authentication is very important task in mobile network system. It performs the first defense to prevent attackers before any other communication activities to make sure that all the entities are correctness. Some proposed protocols have been introduced in the literature, which are quite efficient. However they are based on the techniques which are not suitable in current mobile communication system. On the other hand, some schemes have the same drawback such as high bandwidth between mobile user and the system. Therefore, in order to satisfy the problem that the mobile users have low computation and communication capability, authentication schemes need more upgrading.
    In this paper, an improvement of Hwang and Chang’s protocol is proposed to resolve some drawbacks: the authentication must be under the assumption of clock synchronization between visited location register (VLRs) and home location register (HLR). Moreover, the improved protocol not only does the proposed solution achieve mutual authentication, but also greatly reduces the computation and communication cost of the mobile users as compared with the existing authentication schemes, for instance, Hwang and Chang’s protocol [2], Fan et al.’s protocol [1].

    Table of Contents Acknowledgement III 中文摘要 VI Abstract VIII Table of Contents X List of Tables XII List of Figures XIII Chapter 1: Introduction 1 Chapter 2: Related work 3 2.1 Review of GSM authentication protocol 3 2.1.1 Security Algorithms in GSM 4 2.1.2 Authentication protocol 5 2.2 Fan et al.’s protocol 8 2.3 Hwang and Chang’s protocol 13 2.4 Ammayappan et al.’s protocol 17 2.5 Fanian et al.’s protocol 20 2.6 Suzuki and Nakada’s protocol 23 2.7 Lee et al.’s protocol 27 Chapter 3 Our Proposed Protocol 33 3.1 The mutual authentication mechanism 33 3.1.1 The timestamp-based authentication protocol 33 3.1.2 The Nonce-based authentication protocol 35 3.2 Our Proposed Protocol 36 Chapter 4: The Comparison and Analysis 41 4.1 Security Analyses 41 4.2 Comparison 43 Chapter 5 Conclusion 46 References 47

    References
    [1] Chun-I Fan, Pei-Hsiu Ho, and Ruei-Hau Hsu, “Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications” IEEE Transactions on Networking, Vol. 18, No. 3, June 2010.
    [2] K. F. Hwang and C. C. Chang, “A self-encryption mechanism for authentication of roaming and teleconference services,” IEEE Transactions on Wireless Communication, Vol. 2, No. 2, pp. 400–407, Mar. 2003.
    [3] Jörg Eberspächer, Hans-Jörg Vögel, Christian Bettstetter and Christian Hartmann, “GSM – Architecture, Protocols and Services, Third Edition” © 2009 John Wiley & Sons, Ltd. ISBN: 978- 0- 470- 03070- 7.
    [4] Digital Cellular Telecommunications System (Phase 2+); Security Related Network Functions (GSM 03.20 version 6.1.0 Release 1997), Technical Specification, ETSI, Valbonne – France, http://www.3gpp.org/ftp/Specs/archive/03_series/03.20/, 9th September 2005.
    [5] GSM Security Algorithms, Article, GSM Association 2005, 9th September 2005.
    [6] ETSI (1993). Recommendation GSM 02.09: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993.
    [7] K. Ammayappan, A. Saxena, and A.Negi, “mutual authentication and key agreement based on elliptic curve cryptography for GSM” in Proc, ADCOM, 2006, pp, 183 – 186.
    [8] A.Fanian, M. Berenjkoub, and T.A. Gulliver, “A new mutual authentication protocol for GSM networks”, proceedings of CCECE’09, pp. 798-803, 2009
    [9] C. C. Chang, J. S. Lee, and Y. F. Chang, “Efficient authentication protocol of GSM,” Computer, Communication, vol. 28, no. 8, pp. 921–928, 2005.
    [10] C. Tang and D. O. Wu, “An efficient mobile authentication scheme for wireless networks ”, IEEE Trans, Wireless Com, Vol. 7, No. 4, pp.1408-1416, April, 2008.
    [11] M. Al. Fayoumi, S. Nashwan, S. Yousef, and A. R. Alzoubaidi, “A new hybrid approach of symmetric/asymmetric authentication protocol for future mobile networks,” in Proc. Wireless Mobile Computer., Network. Communication 2007, pp. 29–29.
    [12] V. Kalaichelvi and R. M. Chandrasekaran, “Secure authentication protocol for mobile,” Proc. Computer., Communication. Network pp. 1–4, 2008.
    [13] K. P. Kumar, G. Shailaja, A. Kavitha, and A. Saxena, “Mutual authentication and key agreement for GSM,” in Proc. ICMB, 2006, p. 25.
    [14] K. Ammayappan, A. Saxena, and A. Negi, “Mutual authentication and key agreement based on elliptic curve cryptography for GSM,” in Proc.ADCOM, 2006, pp. 183–186.
    [15] L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm, “Extensions to an authentication technique proposed for the global mobility network,” IEEE Trans. Com., vol. 48, no. 3, pp. 373–376, Mar., 2000.
    [16] S. Suzuki and K. Nakada, “An authentication technique based on distributed security management for the global mobility network,” IEEE J. Sel. Areas Com., vol. 15, no. 8, pp. 1608–1617, Oct. 1997.
    [17] 3rd Generation Partnership Project; Technical specification group services and system aspects; Security related network functions (Release 11), 3GPP TS 43.020 V11.0.0, June 2011.
    [18] A. Mehrotra and L. Golding; “Mobility and security management in the GSM system and some proposed future improvements”; Proc. IEEE, vol. 86, pp. 1480–1496, July 1998.
    [19] T. F. Lee, C. C. Chang and T. Hwang; “Private Authentication Techniques for the Global Mobility Network”; Springer, Wireless Personal Communications 35, 329–336, 2005.
    [20] D. L. Mills, “Precision Synchronization of Computer Network Clocks”, ACM Computer and Communication. Rev., Vol.24, No. 1, pp. 28–43, January 1994.
    [21] C. C. Lee, M. S. Hwang, and W. P. Yang, “Extension of authentication protocol for GSM,” IEE Proc., Communication, vol. 150, no. 2, pp. 91–95, 2003.
    [22] R.efik Molva, Didier Sarnfat, and Gene Tsudik, “Authentication of mobile users,” IEEE Network, pp. 26-34, hIIarch/April 1994.
    [23] Moe Rahnerna, “Overview of the GSM system and protocol Architecture,” IEEE Communication Magazine, pp. 92-100, April 1993.
    [24] LO, C.C, and Chen, Y.J. “Secure communication mechanism for GSM networks” IEEE Transaction, Con., Electronic. 45, (4), pp. 10741080, 1999.
    [25] LO, C.C., and CHEN, Y.J. “A secure communication architecture for GSM networks”. Proceedings of IEEE Pacific Rim Conference on Communications, computers and signal processing., pp., 221-224, 1999.
    [26] STALLINGS, W.: ‘Cryptography and network security: Principles and practice’ (Prentice Hall, 2nd Edison, 1999).
    [27] C.C Lee, I.E Liao, M.S Hwang “An efficient authentication protocol for mobile communications ” Springer Science+Business Media, LLC 2010

    下載圖示 校內:2016-08-12公開
    校外:立即公開
    QR CODE