skip to main content
10.1145/1352533.1352544acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks

Published:31 March 2008Publication History

ABSTRACT

Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless networks, we proposed a hierarchical ID-based roaming protocol in this paper. In our scheme, we use a 2-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the roaming user is the end user. With the hierarchical ID-based cryptosystem, we can avoid involvement with home network, and keep the roaming the user's identity private. Furthermore, not only the root authority is relieved from management of a large amount of private/public key pairs, but the domain servers are free to generate key pairs for their registered users. At the same time, we use hash chains together with ID-based signatures to achieve non-repudiation for service payment.

References

  1. 3rd Generation Partnership Project. 3GPP Specification: 3GPP TS 33.102, 3G Security, Security Architecture, December 2002.Google ScholarGoogle Scholar
  2. G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik. Untraceable mobility or how to travel incognito. International Journal of Computer and Telecommunications Networking, 31(9), 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In Advances in Cryptology - Crypto'01, Lecture Notes in Computer Science, volume 2139, pages 213--229, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Go and K. Kim. Wireless Authentication Protocol Preserving User Anonymity. In the Symposium on Cryptography and Information Security(SCIS)'01, pages 159--164, 2001.Google ScholarGoogle Scholar
  5. R. Hauser, M. Steiner, and M. Waidner. Micro-Payments based on iKP. IBM Research Report 2791, 1996.Google ScholarGoogle Scholar
  6. J. Horwitz and B. Lynn. Toward hierarchical id-based encryption. In Proceedings of EUROCRYPT '02, volume LNCS 2332, pages 466--481, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Jiang, C. Lin, and S. Shen. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks. IEEE Transactions on Wireless Networks, 5(9), 2006.Google ScholarGoogle Scholar
  8. H.-Y. Lin and L. Harn. Authentication Protocols for Personal Communication Systems. In ACM SIGCOMM'95, pages 256--261, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Rahnema. Overview of the gsm system and protocol architecture. IEEE Communications Magazine, April 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Samfat, R. Molva, and N. Asokan. Untraceability in Mobile Networks. In ACM Mobicom'95, pages 26--36, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Scott. MIRACL: Multiprecision Integer and Rational Arithmetic C/C++ Library.Google ScholarGoogle Scholar
  12. A.-F. Sui, S. Chow, L. Hui, and S. M. Yiu. Separable and Anonymous Identity-Based Key Issuing. In Proceedings of the 11th ICPADS '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Yang, D. Wong, and X. Deng. Deposit-case Attack against Secure Roaming. In Proceedings of ACISP '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Yang, D. S. Wong, and X. Deng. Efficient Anonymous Roaming and Its Security Analysis. In ACNS '05, volume LNCS 3531, pages 334--349, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Zhou and K.-Y. Lam. Undenialbe Billing in Mobile Communication. In Proceedings of ACM MOBICOM '98, pages 284--290, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Zhu and J. Ma. A New Authentication Scheme with Anonymity for Wireless Environments. IEEE Transactions on Consumer Electronics, 50(1), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WiSec '08: Proceedings of the first ACM conference on Wireless network security
      March 2008
      234 pages
      ISBN:9781595938145
      DOI:10.1145/1352533

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 March 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate98of338submissions,29%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader