跳到主要內容

臺灣博碩士論文加值系統

(44.210.83.132) 您好!臺灣時間:2024/05/27 02:14
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳煥文
研究生(外文):Huan-Wen Chen
論文名稱:行動網路安全機制之研究
論文名稱(外文):A Research on Security Mechanisms in Mobile Networks
指導教授:張雅芬張雅芬引用關係
指導教授(外文):Ya-Fen Chang
學位類別:碩士
校院名稱:國立臺中科技大學
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:英文
論文頁數:28
中文關鍵詞:全球漫遊移動網絡使用者匿名同步平行攻擊
外文關鍵詞:global roamingmobility networksuser anonymitysynchronizationparallel attack
相關次數:
  • 被引用被引用:0
  • 點閱點閱:230
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在現代通訊中,無線移動網路扮演著重要角色。使用者可使用行動裝置隨時隨地存取無線移動網路且取得所需資料。全球移動網路(Global Mobile Network)可在異地網路提供由本地代理支援的漫遊服務。但由於傳輸媒體的特質,任何人都可以竊聽或攔截無線傳輸的訊息。此屬性使得身份驗證對在安全性的確保上為一重要因素。
最近,Madhusudhan和Shashidhara提出了一種用於全球移動網路中漫遊服務的認證方案。他們聲稱他們的方案可以確保使用者匿名和不可追踪性、相互驗證、完美的前向保密、本地密碼驗證、會談金鑰安全性和公平性、無時間同步問題及用戶友好性。在分析了他們的方案後,我們發現它存在一些缺陷。首先,惡意使用者可以取得會談金鑰。其次,惡意使用者可以冒充合法使用者。第三,他們的方案無法抵禦去同步攻擊。第四,他們的方案無法確保外地代理與本地代理間的相互認證。
此外,Gupta和Chaudhari在2018年為全球移動網路中的漫遊服務提出了匿名雙因素身份驗證協議。他們聲稱,他們的方案不僅可確保強大的用戶匿名性、相互身份驗證和完美的前向保密,還可抵禦去同步攻擊、密碼猜測攻擊,重播攻擊和內部攻擊。在分析了他們的方案後,我們發現它存在一些缺陷。首先,外地代理無法確定本地代理是誰以及所接收的請求是否傳送予自己。其次,本地代理無法成功記錄認證失敗的次數。第三,外地代理無法確定本地代理發送的消息是否傳送予自己。第四,惡意使用者可發動平行攻擊來獲取未經授權的服務。
在本研究中,我們將詳細說明上面兩個為全球移動網路設計的安全方案所無法抵禦之攻擊及安全缺失。
In contemporary communications, wireless mobile networks play an important role. Users use mobile devices to access wireless mobile networks anytime and anywhere to get the needed data. Global Mobile Network (GLOMONET) provides roaming services supported by a home agent in any foreign network. Due to the nature of transmission media, anyone can eavesdrop or intercept the messages transmitted wirelessly. This property makes authentication important to ensure security.
Recently, Madhusudhan and Shashidhara proposed an authentication scheme for roaming service in global mobile networks. They claimed that their scheme could ensure user anonymity and untraceability, mutual authentication, perfect forward secrecy, local password verification, session key security and fairness, no time synchronization problem, and user friendliness. After analyzing their scheme, we find that it suffers from some flaws. First, a session key can be retrieved by a malicious user. Second, a malicious user can impersonate a legal user. Third, their scheme suffers from de-synchronization attack. Fourth, mutual authentication between the foreign agent and the home agent is not ensured as claimed.
Meanwhile, Gupta and Chaudhari proposed an anonymous two factor authentication protocol for roaming service in global mobile networks in 2018. They claimed that their scheme could not only ensure strong user anonymity, mutual authentication and perfect forward secrecy but also resist desynchronization attack, password guessing attack, replay attack, and insider attack. After analyzing their scheme, we find that it suffers from some flaws. First, the foreign agent cannot determine who the home agent is and whether the received request is for itself or not. Second, some operation cannot be executed by the home agent to record the number of authentication failure. Third, the foreign agent cannot determine whether the message received sent by the home agent is for itself or not. Fourth, a malicious user can mount parallel attack to obtain the unauthorized service.
In this thesis, we will show the security flaws that these two schemes designed for Global Mobile Network suffer from.
中文摘要 i
Abstract ii
Table of contents iv
List of figures v
Chapter 1. Introduction 1
1.1 Motivation and background 1
1.2 Study organization 3
Chapter 2. Review of Madhusudhan and Shashidhara’s authentication scheme 4
2.1 Notations 4
2.2 Initialization phase 4
2.3 Registration phase 5
2.4 Login and authentication phase 6
2.5 Password change phase 7
Chapter 3. Security analysis of Madhusudhan and Shashidhara’s scheme 9
3.1 The leakage of the shared session key 9
3.2 Impersonation attack 10
3.3 De-synchronization attack 11
3.4 Lack of mutual authentication between FA and HA 12
Chapter 4. Review of Gupta and Chaudhari’s authentication protocol 14
4.1 Notations 14
4.2 Registration phase 15
4.3 Mutual authentication phase 16
4.4 Password change phase 18
4.5 Revocation phase 18
Chapter 5. Security analysis of Gupta and Chaudhari’s authentication protocol 21
5.1 Infeasibility for FA to determine who HA is and whether M1 is for itself or not 21
5.2 Infeasibility for HA to increase HoneyList of the corresponding IDMU which does not exist in UserList 21
5.3 Infeasibility for FA to determine whether the message received from HA is for itself or not 22
5.4 Parallel attack to obtain the unauthorized service 23
Chapter 6. Conclusions 25
Bibliography 26
[1]J. Zhu and J Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, Vol. 50. No. 1, pp. 231-235, 2004.

[2]C.C. Lee, M.S. Hwang and I.E. Liao, “Security enhancement on a new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Industrial Electronics, Vol. 53, No. 5, pp. 1683-1687, 2006.

[3]C.C. Wu, W.B. Lee and W.J. Tsaur, “A secure authentication scheme with anonymity for wireless communications,” IEEE Communications Letters, Vol. 12, No. 10, pp. 722-723, 2008.

[4]C.C. Chang, C.Y. Lee and Y.C. Chiu, “Enhance authentication scheme with anonymity for roaming service in global mobility networks,” Computer Communications, Vol. 32, No. 4, pp. 611-618, 2009.

[5]T.Y. Youn, T.H. Park and J. Lim, “Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks,” IEEE Communications Letters, Vol. 13, No. 7, pp. 471-473, 2009.

[6]C. Tang and D.O. Wu, “Mobile privacy in wireless networks revisited,” IEEE Transactions on Wireless Communications, Vol. 7, No. 3, pp. 1035-1042, 2008.

[7]J. Lu and J. Zhou, “On the security of an efficient mobile authentication scheme for wireless networks,” Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing (WICO2010), pp. 23-25, 2010.

[8]T. Zhou and J. Xu, “Provable secure authentication protocol with anonymity for roaming service in global mobility networks,” Computer Networks, Vol. 55, No. 1, pp. 205-213, 2011.

[9]E.J. Yoon, K.Y. Yoo and K.S. Ha, “A user friendly authentication scheme with anonymity for wireless communications,” Computers and Electrical Engineering, Vol. 37, No. 3, pp. 356-364, 2011.

[10] C.T. Li, “A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications,” Information Technology and Control, Vol. 41, No. 1, pp. 69-76, 2012.

[11] C. Kai, W.C. Kuo and J.C. Cheng, “A novel mobile communications authentication scheme with roaming service and user anonymity,” Applied Sciences, Vol. 6, No. 12, Paper No. 393, 2016.

[12]M. Karuppiah and R. Saravanan, “A secure authentication scheme with user anonymity for roaming service in global mobility networks,” Wireless Personal Communications, Vol. 84, No. 3, pp. 2055-2078, 2015.

[13]R. Madhusudhan and Shashidhara, “A secure and lightweight authentication scheme for roaming service in global mobile networks,” Journal of Information Security and Applications, Vol. 38, pp. 96-110, 2018.

[14]Y.F. Chang, H.W. Chen, W.L. Tai, and P.L. Hou, “Security analyses of a lightweight authentication scheme for roaming service in global mobile networks,” Proceedings of e-CASE & e-Tech 2019, Fukuoka, Japan, pp. 291-298, April 2019.

[15]Gupta and Chaudhari, “Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit,” Ad Hoc Networks, Vol. 84, pp. 56-67, 2019.

[16]D. Wang and P. Wang, “Two birds with one stone: Two-factor authentication with security beyond conventional bound,” IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 4, pp. 708-722, 2018.

[17]ANSI X9.62, “Public key cryptography for financial services industry: The elliptic curve digital signature algorithm (ECDSA),” American National Standard Institute, 1999.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top