Wireless authentication protocols assuring user anonymity and end-to-end confidentiality = 이용자 익명성과 단말이용자간 기밀성을 보장하는 무선 인증 프로토콜

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 293
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorGo,Jae-Seung-
dc.contributor.author고재승-
dc.date.accessioned2011-12-28T02:46:39Z-
dc.date.available2011-12-28T02:46:39Z-
dc.date.issued2001-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392029&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/54698-
dc.description학위논문(석사) - 한국정보통신대학원대학교 : 공학부, 2001, [ x, 46 p. ]-
dc.description.abstractIn this thesis, we propose an authentication protocol that satisfies the security features required in wireless mobiles systems and preserves the anonymity of a mobile user. And we present the construction method of the end-to-end security protocol between two mobile users. The security services required in wireless mobile systems include:mutual authentication between the user and the network, the confidentiality of user data and signaling data, user anonymity over wireless and wired link and end-to-end confidentiality between two mobile users. In particular, we focus on the two services, user anonymity and end-to-end security. The important issue in the provision of security services in wireless mobile systems is to design the authentication protocol in which communication partners authenticate each other and agree on the secret session key which will be used to secure the subsequent session. In the design of the authentication protocol, we should consider the security features to be achieved during the run of the protocol and several environmental factors specific to wireless mobile systems. A basic solution for the provision of anonymity is to use the temporary identity(TID) of a mobile user instead of his real one. Before designing the authentication protocol, we discuss the previous protocols according to the anonymity schemes which were adapted to the protocol design. Several schemes have been proposed for the generation and computation do TID in the design of the protocol. The first method for providing user anonymity is the use of prearranged TID that has been distributed to the user by the home network or visited network. This method needs periodic changes of TID and an additional protocol to share a new TID between the user and the network. Another method is to encrypt the real identity of the user using the public key of the network. Both schemes are based on shared key crytosystems. They don``t provide some security features of wireless authe...eng
dc.languageeng-
dc.publisher한국정보통신대학원대학교-
dc.subjectWireless authentication-
dc.subjectAnonymity-
dc.subject익명성-
dc.subject무선인증-
dc.titleWireless authentication protocols assuring user anonymity and end-to-end confidentiality = 이용자 익명성과 단말이용자간 기밀성을 보장하는 무선 인증 프로토콜-
dc.typeThesis(Master)-
dc.identifier.CNRN392029/225023-
dc.description.department한국정보통신대학원대학교 : 공학부, -
dc.identifier.uid000993838-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0