ABSTRACT
Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless networks, we proposed a hierarchical ID-based roaming protocol in this paper. In our scheme, we use a 2-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the roaming user is the end user. With the hierarchical ID-based cryptosystem, we can avoid involvement with home network, and keep the roaming the user's identity private. Furthermore, not only the root authority is relieved from management of a large amount of private/public key pairs, but the domain servers are free to generate key pairs for their registered users. At the same time, we use hash chains together with ID-based signatures to achieve non-repudiation for service payment.
- 3rd Generation Partnership Project. 3GPP Specification: 3GPP TS 33.102, 3G Security, Security Architecture, December 2002.Google Scholar
- G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik. Untraceable mobility or how to travel incognito. International Journal of Computer and Telecommunications Networking, 31(9), 1999. Google Scholar
Digital Library
- D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In Advances in Cryptology - Crypto'01, Lecture Notes in Computer Science, volume 2139, pages 213--229, 2001. Google Scholar
Digital Library
- J. Go and K. Kim. Wireless Authentication Protocol Preserving User Anonymity. In the Symposium on Cryptography and Information Security(SCIS)'01, pages 159--164, 2001.Google Scholar
- R. Hauser, M. Steiner, and M. Waidner. Micro-Payments based on iKP. IBM Research Report 2791, 1996.Google Scholar
- J. Horwitz and B. Lynn. Toward hierarchical id-based encryption. In Proceedings of EUROCRYPT '02, volume LNCS 2332, pages 466--481, 2002. Google Scholar
Digital Library
- Y. Jiang, C. Lin, and S. Shen. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks. IEEE Transactions on Wireless Networks, 5(9), 2006.Google Scholar
- H.-Y. Lin and L. Harn. Authentication Protocols for Personal Communication Systems. In ACM SIGCOMM'95, pages 256--261, 1995. Google Scholar
Digital Library
- M. Rahnema. Overview of the gsm system and protocol architecture. IEEE Communications Magazine, April 1993.Google Scholar
Digital Library
- D. Samfat, R. Molva, and N. Asokan. Untraceability in Mobile Networks. In ACM Mobicom'95, pages 26--36, 1995. Google Scholar
Digital Library
- M. Scott. MIRACL: Multiprecision Integer and Rational Arithmetic C/C++ Library.Google Scholar
- A.-F. Sui, S. Chow, L. Hui, and S. M. Yiu. Separable and Anonymous Identity-Based Key Issuing. In Proceedings of the 11th ICPADS '05, 2005. Google Scholar
Digital Library
- G. Yang, D. Wong, and X. Deng. Deposit-case Attack against Secure Roaming. In Proceedings of ACISP '05, 2005. Google Scholar
Digital Library
- G. Yang, D. S. Wong, and X. Deng. Efficient Anonymous Roaming and Its Security Analysis. In ACNS '05, volume LNCS 3531, pages 334--349, 2005. Google Scholar
Digital Library
- J. Zhou and K.-Y. Lam. Undenialbe Billing in Mobile Communication. In Proceedings of ACM MOBICOM '98, pages 284--290, 1998. Google Scholar
Digital Library
- J. Zhu and J. Ma. A New Authentication Scheme with Anonymity for Wireless Environments. IEEE Transactions on Consumer Electronics, 50(1), 2004. Google Scholar
Digital Library
Index Terms
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Recommendations
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another ...
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
IWSEC 2015: Proceedings of the 10th International Workshop on Advances in Information and Computer Security - Volume 9241Revocable Hierarchical Identity-Based Encryption RHIBE is a variant of Identity-Based Encryption IBE, which enables the dynamic user management; a Key Generation Center KGC of a usual IBE has a key issuing ability. In contrast, in a RHIBE, a KGC can ...
Privacy-preserving identity-based broadcast encryption
Broadcast encryption enables a broadcaster to encrypt messages and transmit them to some subset S of authorized users. In identity-based broadcast encryption schemes, a broadcasting sender typically encrypts a message by combining public identities of ...





Comments