Font Size: a A A

A Lightweight Anonymous Authentication Protocol Based On Shred Secret Key In Wireless Networks

Posted on:2018-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y SongFull Text:PDF
GTID:2348330521950947Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In recent years,with the frequent occurrence of data leakage incidents,people pay more and more attention to personal privacy protection.However,in the wireless network environment,the traditional identity authentication scheme may lead to the disclosure of user identity information,and thus the user's privacy and security posed a threat.In order to protect personal privacy,more and more users choose to access the wireless network through anonymous authentication.Therefore,it is very important to study the anonymous authentication scheme in the wireless network environment.Most of the existing anonymous authentication schemes are based on non-shared keys,which are computationally intensive and occupy large storage space,and are not suitable for mobile devices with limited capacity in the wireless network environment.For this reason,Li et al.proposed a lightweight anonymous authentication protocol that uses the k-pseudonym set to reduce device resource consumption.But the research shows that the protocol can't resist the association analysis for the authentication time,will lead to the disclosure of user identity information.In view of the above problems,this paper improves the Li anonymous authentication protocol and makes up for the security flaws of the protocol.This paper based on the shared key to propose an improved lightweight wireless network anonymous authentication scheme.The main work of this paper is as follows:1.The security analysis of the anonymous authentication scheme proposed by Li et al.shows that the processing time of the authentication server to the user authentication request in this scheme may lead to the leakage of user identity information.And build a test platform,simulation attack experiments.Through the analysis and processing of the experimental data,it is proved that the scheme does exist the above security defects,which causes a greater threat to user's privacy and security.2.Based on the improvement of security flaws in the anonymous authentication scheme proposed by Li et al.,a lightweight anonymous authentication scheme based on shared key in wireless network is proposed.In this protocol,a user grouping mechanism is introduced.User uses the GID to authenticate,and even if the attacker intercepts,it can't analyze the user's identity information.And the authentication server completes the user authentication within the scope of the group corresponding to the GID,to avoid the authentication server excessive resource consumption.3.The improved anonymous identity authentication protocol is compared with the existing anonymous authentication protocols in terms of anonymity,anti-attack,two-way authentication,forward secrecy,backward secrecy and so on,the comparison results show that the improved protocol presented in this paper has better performance in security.The improved protocol is implemented and the test environment is built,and the performance test and evaluation are carried out.The test results show that the authentication time of the improved protocol has better stability.In addition,through the analysis of experimental data,show that the improved protocol has low computational complexity and small communication amount and needed little storage space,can be better suitable for mobile devices with limited ability in wireless network environment.
Keywords/Search Tags:wireless network, shared key, lightweight, anonymous authentication
PDF Full Text Request
Related items