Identity-based anonymity authentication protocol in the heterogeneous wireless network

Aiming at the security of authentication protocol for heterogeneous wireless network,a mutual authentication and key agreement protocol,which was based on CPK algorithm and improved ECDH algorithm,was proposed.The temporary authentication identity and temporary communication identity was adopted to...

Full description

Saved in:
Bibliographic Details
Main Authors: HOU Hui-fang1, JI Xin-sheng2, LIU Guang-qiang1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74418458/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Aiming at the security of authentication protocol for heterogeneous wireless network,a mutual authentication and key agreement protocol,which was based on CPK algorithm and improved ECDH algorithm,was proposed.The temporary authentication identity and temporary communication identity was adopted to realize user identity anonymity.The ordered pair of temporary communication identity was proposed to prevent replay attack in the process of re-authentication.The risk of key compromise was also avoided in the proposed protocol.By security analysis,this protocol had the security properties such as identity authentication,key security and anonymity.
ISSN:1000-436X