Access Authentication

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 47007 Experts worldwide ranked by ideXlab platform

Jin Cao - One of the best experts on this subject based on the ideXlab platform.

  • LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
    IEEE Internet of Things Journal, 2020
    Co-Authors: Jin Cao, Zheng Yan, Yinghui Zhang
    Abstract:

    As a development of the next generation of mobile communication networks and systems (5G), the Third-Generation Partnership Project (3GPP) committee has standardized a new 5G Authentication and key-agreement (5G-AKA) protocol to ensure the Access security of a mobile equipment. However, there are still some security vulnerabilities in the 5G-AKA protocol, and there is no Authentication protocol proposed for massive device concurrent connection by the 3GPP working groups. In this article, we propose a novel lightweight and secure Access Authentication scheme named lightweight secure Access Authentication (LSAA) that contains two lightweight extended Chebyshev chaotic maps-based Access Authentication protocols for two types of 3GPP standard mobile devices: 1) common user equipment (UE) and 2) massive machine-type communication (mMTC) devices. Our proposed protocols can achieve several security functionalities, including mutual Authentication, session-key establishment, identity privacy protection, and perfect forward/backward secrecy (PFS/PBS). In addition, the proposed protocols are lightweight in nature compared with the 5G-AKA. In order to comprehensively and accurately evaluate LSAA, we carry out formal security analysis by employing two formal verification tools Proverif and Scyther, and informal security analysis on the proposed protocols. We further evaluate the performance of the proposed protocols with regard to Authentication signaling cost, Authentication communication cost, Authentication computational cost, and Authentication storage cost. The security evaluation and performance analysis results show that our proposed protocols can provide advanced security and high efficiency.

  • LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks
    IEEE Internet of Things Journal, 2020
    Co-Authors: Jin Cao, Dengguo Feng
    Abstract:

    Space information network (SIN), which has the characteristics of large capacity, high reliability, and wide coverage, can be effectively applied to the Internet of Things (IoT) business. However, SIN is vulnerable to various attacks due to its highly exposed links, and the power and processing capacity of satellites and IoT devices (IoTDs) are usually limited. Meanwhile, massive IoTDs connecting to SIN in an instant incur a severe signaling congestion and there is no Authentication protocol proposed for massive IoTDs in SIN. In this article, we first propose a novel semi-aggregated signature mechanism and session key agreement mechanism. Then, based on the above two mechanisms, we propose a novel Access Authentication scheme named lattice-based Access Authentication (LAA) which contains two types of lattice-based Authentication protocols: 1) LAA for massive IoTDs and 2) LAA for a single IoTD. The security analysis by employing the formal provable security analysis, the automation verification tool named Scyther, the Burrows–Abadi–Needham-logic, and the informal security analysis demonstrate that our proposed protocols successfully achieve these security properties, including mutual Authentication, conditional anonymity, unlinkability, data confidentiality, data integrity, unforgeability, undeniability, key establishment, perfect forward/backward secrecy (PFS/PBS), and resistance against protocol attacks and quantum attacks. We further evaluate the performance of our proposed protocols with regard to signaling overhead, transmission overhead, computational overhead, and Authentication delay, which shows that our proposed protocols can provide high efficiency.

  • anti quantum fast Authentication and data transmission scheme for massive devices in 5g nb iot system
    IEEE Internet of Things Journal, 2019
    Co-Authors: Jin Cao, Xinyin Xiang, Pu Yu, Hui Li
    Abstract:

    The narrowband Internet of Things (NB-IoT) system has become an integral part of the future fifth generation (5G) network. Although the NB-IoT system has gradually been improved in the traditional LTE network currently, the NB-IoT system does not have an effective Access Authentication scheme in the future 5G network. According to the current 3rd Generation Partnership Project (3GPP) standard, NB-IoT devices still use the traditional Access Authentication method to perform mutual Authentication with the network, which may bring a large amount of signaling and communication overhead. This problem will be magnified in a large-scale device environment in the future 5G network. In this article, a quantum resistance Access Authentication and data distribution scheme is proposed for large-scale NB-IoT devices. The scheme can simultaneously implement Access Authentication and data transmission of a group of NB-IoT devices based on the lattice-based homomorphic encryption technology. Our scheme not only greatly reduce the network burden but also achieve strong security, including privacy protection and anti-quantum attacks. The performance analysis results show that our scheme has the ideal efficiency.

  • WCNC - Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks
    2019 IEEE Wireless Communications and Networking Conference (WCNC), 2019
    Co-Authors: Pu Yu, Maode Ma, Jin Cao, Ben Niu, Hui Li, Fenghua Li
    Abstract:

    The Narrow Band Internet of Things (NB-IoT) system has become an important branch of the Internet of Everything and is an indispensable part in future fifth Generation (5G) network. However, there is currently no effective Access Authentication scheme for the NB-IoT system in the future 5G network. According to the current 3GPP standard, NB-IoT devices still use the traditional Access Authentication method to perform the mutual Authentication with the network, which may bring a lot of signaling and communication overheads. This problem will be more prominent when sea of NB-IoT devices simultaneously are activated in the 5G network. In this paper, we propose a quantum-resistance Access Authentication and data distribution scheme for massive NB-IoT devices. This scheme can implement Access Authentication and data transmission for a group of NB-IoT devices at the same time based on the lattice-based homomorphic encryption technology. Our scheme can not only greatly reduce the network burden, but also can achieve the strong security including privacy protection and resisting quantum attacks. Performance analysis results show that our solution has the desired efficiency.

  • GBAAM: Group-based Access Authentication for MTC in LTE networks
    Security and Communication Networks, 2015
    Co-Authors: Jin Cao, Maode Ma, Hong Jiao Li
    Abstract:

    © 2015 John Wiley & Sons, Ltd. Machine-type communication (MTC), as one of the most important communication approaches in the future mobile communication, has drawn more and more attention. To meet the requirements of low power consumption of devices and mass device transmission is the key issue to achieve MTC applications security in the long-term evolution (LTE) networks. When a large number of MTC devices simultaneously connect to the network, each MTC device needs to implement an independent Access Authentication procedure in the current third generation partnership project standard, which will cause a severe signaling congestion in the LTE network. In this paper, we propose a group-based Access Authentication scheme, by which a good deal of MTC devices can be simultaneously authenticated by the network and establish an independent session key with the network respectively. Our scheme not only can greatly reduce the signal transmission for mass of devices to the network and thus avoid the signaling overload over the LTE network but also can achieve robust security including key forward/backward secrecy and non-repudiation verification. The experimental results and formal verification by using the temporal logic actions and temporal logic checker show that the proposed scheme is secure against various malicious attacks.

Ashley Moye - One of the best experts on this subject based on the ideXlab platform.

Pang Liaojun - One of the best experts on this subject based on the ideXlab platform.

  • Security Analysis and Verification of WAPI Access Authentication Protocol (WAI)
    Computer Engineering, 2008
    Co-Authors: Pang Liaojun
    Abstract:

    Based on the thoroughly researches and analysis on the WLAN Authentication and Privacy Infrastructure (WAPI) Access Authentication process, i.e. the WAI protocol, this paper analyzes and verifies its Authentication Access process with CK model. Result of analysis indicates that the Authentication Access process of WAI can meet the security requirements of WLAN, such as data privacy protection, integrity protection, mutual identity Authentication, mutual key control, private-key confirmation, etc. Therefore, WAPI can be applied to replace the original security mechanism WEP used in WLAN and to enhance its security.

Tianhan Gao - One of the best experts on this subject based on the ideXlab platform.

  • An Anonymous Access Authentication Scheme for VANETs Based on ISGS
    Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
    Co-Authors: Tianhan Gao, Yanqiang Li, Nan Guo
    Abstract:

    With the rapid warming of intelligent traffic, VANETs is becoming a research hotspot. The Access Authentication and privacy preservation are the foundation of VANETs security. How to improve the efficiency of Access Authentication and guarantee the anonymity of the user has become an urgent needs. In this paper, we propose an anonymous Access Authentication scheme for VANETs based on identity-based short group signature mechanism (ISGS) to improve the efficiency of Access Authentication. Multiple pseudonyms mechanism is introduced to guarantee the privacy of user. In addition, the evaluation mechanism is designed for the identification and revocation of malicious nodes. Through performance analysis, we demonstrate that our scheme is efficient.

  • IMIS - An Anonymous Access Authentication Scheme for VANETs Based on ISGS
    Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
    Co-Authors: Tianhan Gao, Nan Guo
    Abstract:

    With the rapid warming of intelligent traffic, VANETs is becoming a research hotspot. The Access Authentication and privacy preservation are the foundation of VANETs security. How to improve the efficiency of Access Authentication and guarantee the anonymity of the user has become an urgent needs. In this paper, we propose an anonymous Access Authentication scheme for VANETs based on identity-based short group signature mechanism (ISGS) to improve the efficiency of Access Authentication. Multiple pseudonyms mechanism is introduced to guarantee the privacy of user. In addition, the evaluation mechanism is designed for the identification and revocation of malicious nodes. Through performance analysis, we demonstrate that our scheme is efficient.

  • An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs
    Mobile Information Systems, 2017
    Co-Authors: Tianhan Gao, Quanqi Wang, Xiaojie Wang, Xiaoxue Gong
    Abstract:

    Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS) networks. Furthermore, users’ need for privacy-preserved Access during movement procedure is more urgent. To address the anonymous Access Authentication issue for CPS Wireless Mesh Network (CPS-WMN), a novel anonymous Access Authentication scheme based on proxy ring signature is proposed. A hierarchical Authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual Authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  • An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network
    Intelligent Automation & Soft Computing, 2016
    Co-Authors: Tianhan Gao, Ling Tan, Peiyu Qiao, Kangbin Yim
    Abstract:

    AbstractProxy Mobile IPv6 (PMIPv6) enables local network-based mobility management for mobile node without being involved with any mobility-related signalling. However, the lack of Access Authentication makes PMIPv6 more vulnerable. The literature Authentication schemes suffer from low efficiency and suitability. This paper presents a novel efficient Authentication scheme for PMIPv6 based on a 2-level identity-based signature scheme. A mutual Access Authentication protocol is then achieved to eliminate the interactions between the home network and the Access network for improving Authentication efficiency and reducing communication cost. Moreover, the security and performance analysis demonstrate that the proposed scheme is robust and is able to provide better solution than existing ones.

  • IMIS - Access Authentication Schemes for PMIPV6: A Survey
    2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2016
    Co-Authors: Tianhan Gao, Nan Guo, Fanghua Geng, Xinyang Deng
    Abstract:

    PMIPv6 is a network-based mobility management protocol which extends MIPv6 protocol and reduces the configuration load on mobile node's side. However, security issues are the main obstacle for the proliferation of PMIPv6. Access Authentication is the fundamental security needs for mobile node to gain reliable service at the Access network. Unfortunately, few Access Authentication schemes for PMIPv6 are put forward in the last few years. In this paper, we summarize the typical PMIPv6 Authentication schemes from the aspect of centralized Authentication and distributed Authentication, which can give some new idea on the design of novel and efficient Authentication schemes for PMIPv6.

Sang-ho Lee - One of the best experts on this subject based on the ideXlab platform.

  • VTC Spring - Efficient IMS Authentication Architecture based on Initial Access Authentication in WiBro-Evolution (WiBro-EVO) System
    2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring, 2007
    Co-Authors: Sun-hwa Lim, Sang-ho Lee
    Abstract:

    In order to overcome the drawbacks and combine the advantages of both 3G packet-switched mobile communication systems and WLAN, wireless broadband Internet (WiBro) system based on 2.3 GHz bandwidth and IEEE 802.16e has been developed in Korea. Recently, the new version of WiBro system, named WiBro-evolution (WiBro-EVO) system which provides various multimedia services, is researched. In this paper, we investigate the IMS Authentication schemes and propose the efficient IMS Authentication scheme based on the initial Access Authentication scheme in WiBro-EVO system. We also evaluate the performance of the proposed scheme to consider how it reduces the signaling message overhead in the WiBro-EVO network. The proposed scheme can reduce signaling overhead over the radio interface and core network interface. In addition, it can guarantee the integrity SIP registration messages.