Responsive image
博碩士論文 etd-0722105-200627 詳細資訊
Title page for etd-0722105-200627
論文名稱
Title
高效率行動通訊雙向認證機制
An Efficient Mutual Authentication for Mobile Communication
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
48
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2005-07-12
繳交日期
Date of Submission
2005-07-22
關鍵字
Keywords
對稱式加密、資訊安全、安全通訊、行動通訊、認證協定
Authentication protocols, Secure communication, Information security, Symmetric cryptosystems, Mobile communication
統計
Statistics
本論文已被瀏覽 5692 次,被下載 0
The thesis/dissertation has been browsed 5692 times, has been downloaded 0 times.
中文摘要
由於行動通訊技術的快速發展以及行動網路的無遠弗屆,行動通訊的用戶們可以藉著所持有的輕巧的行動電話與彼此溝通而不受時間與地點的限制。這樣的服務已經相當的普及而且漸漸地成為人們生活當中不可或缺的一部分。然而,許許多多的網路攻擊,比如中間人攻擊與重送攻擊,正嚴重地威脅到行動網路的通訊安全,同時間也對行動通訊服務的品質造成了不良的影響。已經有許多關於行動通訊的安全機制的研究被提出,而在這些安全機制當中,身分認證扮演了一個非常重要的角色,因為身分認證可以在用戶進行任何通訊行動之前,完成辨識用戶合法性的動作,所以在整個行動網路的系統裡擔任第一線抵禦攻擊者的工作。因此,為了保障進階服務的品質,一個兼具效率(尤其是用戶的效率方面)與安全性的身分認證機制是迫切需要的。我們將會在這份碩士論文當中,提出一個具有高度安全性的行動通訊系統的身分認證機制。並且我們所提出的機制不只是達到了雙向認證的目標,與其他身分認證機制相較,更大大地降低了用戶在行動通訊方面的計算量與傳輸量。
Abstract
Owing to the fast progress of mobile communication technologies and the ubiquity of mobile networks, users can communicate with each other anytime and anywhere as long as they carry their smart and tiny mobile phones. This convenient communication service is quite popular and gradually joins in the people’s life. Nevertheless, lots of attacks, such as the men-in-the-middle attacks and the replay attacks, are seriously threatening the security of the mobile networks and affecting the quality of the service simultaneously. Many security mechanisms for mobile communication have been introduced in the literature. Among these mechanisms, authentication plays a very important role in the entire mobile network system and acts as the first defense against the attackers since it can ensure the correctness of the identities of communication entities before they engage in any other communication activities. Therefore, to guarantee the quality of this advanced service, an efficient (especially, user efficient) and secure authentication scheme is urgently desired. In this thesis, we will propose a robust authentication scheme for mobile communication systems. Not only does the proposed scheme achieve mutual authentication, but also it greatly reduces the computation and communication cost of mobile users as compared with the existing authentication schemes.
目次 Table of Contents
CHAPTER 1 INTRODUCTION......................................1
CHAPTER 2 THE GSM COMMUNICATION SYSTEM......................4
2.1 THE GSM NETWORK.....................................5
2.2 THE GSM AUTHENTICATION PROTOCOL.....................8
CHAPTER 3 WEAKNESSES OF GSM................................11
3.1 THE MEN-IN-THE-MIDDLE ATTACK.......................12
3.2 UNTRUSTWORTHY ALGORITHMS...........................13
CHAPTER 4 RELATED WORKS....................................14
4.1 BUTTYAN ET AL.’S SCHEME...........................15
4.2 HWANG AND CHANG’S SCHEME..........................18
CHAPTER 5 OUR IDEA.........................................20
CHAPTER 6 THE PROPOSED SCHEME..............................25
6.1 THE SYNCHRONIZATION PROTOCOL WITH AUTHENTICATION...26
6.2 THE JTH AUTHENTICATION AFTER SYNCHRONIZATION.......28
CHAPTER 7 SECURITY ANALYSIS................................31
7.1 THE REPLAY ATTACK..................................32
7.2 THE IMPERSONATING ATTACK...........................34
CHAPTER 8 COMPARISONS......................................36
CHAPTER 9 CONCLUSIONS......................................40
REFERENCES.................................................41
參考文獻 References
[1] K. Boman, G. Horn, P. Howard, and V. Niemi, "UMTS security," Electronics & Communication Engineering Journal, Vol. 14, No. 5, pp. 191-204, 2002.
[2] Alex Biryukov, Adi Shamir, and David Wagner, "Real time cryptanalysis of A5/1 on a pc," Lecture Notes in Computer Science, Vol. 1978, pp. 1-18, 2001.
[3] L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm, "Extensions to an authentication technique proposed for the global mobility network," IEEE Transactions on Communications, Vol. 48, No. 3, pp. 373-376, 2000.
[4] J. Dankers, T. Garefalakis, R. Schaffelhofer, and T. Wright, "Public key infrastructure in mobile systems," Electronics & Communication Engineering Journal, Vol. 14, No. 5, pp. 180-190, 2002.
[5] C. F. Grecas, S. I.Maniatis, and I. S. Venieris, "Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration," Mobile Networks and Applications, Vol. 8, No. 2, pp. 145-150, 2003.
[6] L. Harn and W. J. Hsin, "On the security of wireless network access with enhancements," Proceedings of the 2003 ACM workshop on Wireless Security, pp. 88-95, 2003.
[7] K. F. Hwang and C. C. Chang, "A self-encryption mechanism for authentication of roaming and teleconference services," IEEE Transactions on Wireless Communications, Vol. 2, No. 2, pp. 400-407, 2003.
[8] C. H. Lee, M. S. Hwang, and W. P. Yang, "Enhanced privacy and authentication for the global system for mobile communications," Wireless Networks, Vol. 5, No. 4, pp. 231-243, 1999.
[9] C. C. Lee, M. S. Hwang, and W. P. Yang, "Extension of authentication protocol for GSM," IEE Proceedings-Communications, Vol. 150, No. 2, pp. 91-95, 2003.
[10] T. Jamil, "The Rijndael algorithm," IEEE Potentials, Vol. 23, No. 2, pp. 36-38, 2004.
[11] A. Peinado, "Privacy and authentication protocol providing anonymous channels in GSM," Computer Communications, Vol. 27, No. 17, pp. 1709-1715, 2004.
[12] W. Stallings, Cryptography and Network Security, 3rd ed., Prentice Hall, 2004.
[13] S. Suzuki and K. Nakada, "An authentication technique based on distributed security management for the global mobility network," IEEE Journal Selected Areas in Communications, Vol. 15, No. 8, pp. 1608-1617, 1997.
[14] C. Xenakis and L. Merakos, "Security in third generation mobile networks," Computer Communications, Vol. 27, No. 7, pp. 638-650, 2004.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外均不公開 not available
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 3.238.195.81
論文開放下載的時間是 校外不公開

Your IP address is 3.238.195.81
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code