A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity
Autor: | Longan Wang, Yousheng Zhou |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2020 |
Předmět: |
Provable security
Authentication Science (General) Article Subject Computer Networks and Communications business.industry Computer science NTRU 020206 networking & telecommunications 02 engineering and technology Mutual authentication Public-key cryptography Q1-390 0202 electrical engineering electronic engineering information engineering Foreign agent T1-995 020201 artificial intelligence & image processing Roaming business Technology (General) Information Systems Computer network Anonymity |
Zdroj: | Security and Communication Networks, Vol 2020 (2020) |
ISSN: | 1939-0122 1939-0114 |
Popis: | In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with the help of home agent. There are many roaming authentication schemes which have been proposed; however, with the progress of quantum computation, quantum attack poses security threats to many traditional public key cryptography-based authentication schemes; thus, antiquantum attack roaming authentication schemes need to be investigated. On account of the limitation of computational resources for mobile nodes, a lightweight anonymous and antiquantum authentication schemes need to be developed to enable mobile nodes to roam across multiple service domains securely and seamlessly. In consideration of the advantages of lattice in antiquantum, an NTRU-based authentication scheme with provable security and conditional privacy preservation is proposed to remedy these security weaknesses. Compared with the existing scheme, the proposed scheme not only improves efficiency but also can resist the quantum attack. |
Databáze: | OpenAIRE |
Externí odkaz: |