Identity-based anonymity authentication protocol in the heterogeneous wireless network
|更新时间:2024-10-14
|
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Vol. 32, Issue 5, Pages: 153-161(2011)
作者机构:
1. 河南工业大学信息科学与工程学院
2. 国家数字交换系统工程技术研究中心
作者简介:
基金信息:
DOI:
CLC:TN92
Published:2011
稿件说明:
移动端阅览
HOU Hui-fang1, JI Xin-sheng2, LIU Guang-qiang1. Identity-based anonymity authentication protocol in the heterogeneous wireless network[J]. 2011, 32(5): 153-161.
DOI:
HOU Hui-fang1, JI Xin-sheng2, LIU Guang-qiang1. Identity-based anonymity authentication protocol in the heterogeneous wireless network[J]. 2011, 32(5): 153-161.DOI:
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Aiming at the security of authentication protocol for heterogeneous wireless network
a mutual authentication and key agreement protocol
which was based on CPK algorithm and improved ECDH algorithm
was proposed.The temporary authentication identity and temporary communication identity was adopted to realize user identity anonymity.The ordered pair of temporary communication identity was proposed to prevent replay attack in the process of re-authentication.The risk of key compromise was also avoided in the proposed protocol.By security analysis
this protocol had the security properties such as identity authentication