A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS

Published on Jun 1, 2011
· DOI :10.1109/icc.2011.5962523
Yuan Wang2
Estimated H-index: 2
(USTC: University of Science and Technology of China),
Duncan S. Wong1
Estimated H-index: 1
(USTC: University of Science and Technology of China),
Liusheng Huang26
Estimated H-index: 26
(USTC: University of Science and Technology of China)
A Key Establishment Protocol for Anonymous Wireless Roaming (KEP-AWR) allows a wireless user such as a Wi-Fi/WiMAX enabled laptop or smartphone to establish a session key with a foreign server and also roam from one foreign network to another in an anonymous way such that besides the involving foreign server and the user's home server, no one can find out who the user is. Most existing KEP-AWR protocols involve all the three parties, namely, the roaming user, the foreign server and the home server. Some recent protocols require the user and the foreign server only, and hence improving the efficiency as they incur fewer message flows. Recently, a one-pass KEP-AWR was proposed by Wang, Wong and Huang (WWH in short) which achieves key establishment and anonymity by just sending one message from the user to the foreign server, and it is the first KEP-AWR achieving the one-pass communication efficiency. However, the WWH protocol neither prevents the home server from knowing the session key nor supports Perfect Forward Secrecy (PFS). In this paper, we propose a new one-pass KEP-AWR which solves these two problems with an even lower computational complexity. The new protocol also achieves perfect Key-Compromise Impersonation (KCI) security.
  • References (18)
  • Citations (2)
📖 Papers frequently viewed together
2016ICIST: International Conference on Information Science and Technology
3 Citations
3 Authors (Qian Wei, ..., Xing Zhang)
1 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
Jun 1, 2010 in WCNIS (Wireless Communications, Networking and Information Security)
#1Yuan Wang (USTC: University of Science and Technology of China)H-Index: 2
#2Duncan S. Wong (CityU: City University of Hong Kong)H-Index: 1
Last. Liusheng Huang (USTC: University of Science and Technology of China)H-Index: 26
view all 3 authors...
In recent years, privacy protection for a roaming user has become an increasingly demanding requirement for wireless communications. A secure wireless roaming protocol should not only establish a secure session key between a roaming user and a foreign server, but also provide privacy protection so to keep user identity from being exposed (user anonymity) and user movement from being tracked (user untraceability). In this paper, we propose the first one-pass anonymous key establishment protocol f...
2 CitationsSource
Apr 1, 2010 in WCNC (Wireless Communications and Networking Conference)
#1Xiaokang Xiong (CityU: City University of Hong Kong)H-Index: 2
#2Duncan S. Wong (CityU: City University of Hong Kong)H-Index: 42
Last. Xiaotie Deng (CityU: City University of Hong Kong)H-Index: 40
view all 3 authors...
Computing Bilinear Pairing on sensor platforms has become an important research topic since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs). Some previous works have provided benchmarks for the pairing computation on sensors. However, a complete pairingbased cryptographic scheme requires much more than just a bilinear pairing operation, and little work has been done yet in this area. In this paper, we present the first fully functional pairing-based cryptographi...
80 CitationsSource
#1Guomin Yang (NUS: National University of Singapore)H-Index: 24
#2Qiong Huang (CityU: City University of Hong Kong)H-Index: 16
Last. Xiaotie Deng (CityU: City University of Hong Kong)H-Index: 40
view all 4 authors...
A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V and at the same time convinces V that it is a legitimate subscriber of some server H, called the home server of U. The conventional approach requires the involvement of all the three parties. In this paper, we propose a new approach which requires only two parties, U and V, to get involved. We propose two protocols: one provides better effi...
85 CitationsSource
#1Haojin Zhu (UW: University of Waterloo)H-Index: 36
#2Xiaodong Lin (UOIT: University of Ontario Institute of Technology)H-Index: 46
Last. Xuemin Shen (UW: University of Waterloo)H-Index: 85
view all 5 authors...
Wireless metropolitan area sharing networks (WMSNs) are wide-area wireless networks with nodes owned and managed by independent wireless Internet service providers (WISPs). To support seamless roaming in emerging WMSNs, in this paper, we propose a localized and distributed authentication and billing architecture that aims at enabling efficient and privacy-preserving mutual authentication between mobile users (MUs) and WISPs. User anonymity and identity privacy can be protected, even in the prese...
43 CitationsSource
#1Haojin Zhu (UW: University of Waterloo)H-Index: 36
#2Xiaodong Lin (UW: University of Waterloo)H-Index: 46
Last. Xuemin Shen (UW: University of Waterloo)H-Index: 85
view all 5 authors...
The future metropolitan-area wireless mesh networks (WMNs) are expected to contain compromise-prone mesh access points (MAPs) with a high frequency of inter-domain roaming/handoff events. This paper introduces a novel secure localized authentication and billing (SLAB) scheme, which aims to address both security guarantee and performance in terms of system compromise resilience capability, interdomain handoff authentication latency, and workload of the roaming broker (RB). With extensive analysis...
74 CitationsSource
#1Steven D. Galbraith (RHUL: Royal Holloway, University of London)H-Index: 28
#2Kenneth G. Paterson (RHUL: Royal Holloway, University of London)H-Index: 40
Last. Nigel P. Smart (UoB: University of Bristol)H-Index: 53
view all 3 authors...
Many research papers in pairing-based cryptography treat pairings as a ''black box''. These papers build cryptographic schemes making use of various properties of pairings. If this approach is taken, then it is easy for authors to make invalid assumptions concerning the properties of pairings. The cryptographic schemes developed may not be realizable in practice, or may not be as efficient as the authors assume. The aim of this paper is to outline, in as simple a fashion as possible, the basic c...
502 CitationsSource
#1M. Choudary Gorantla (QUT: Queensland University of Technology)H-Index: 11
#2Colin Boyd (QUT: Queensland University of Technology)H-Index: 38
Last. Juan Manuel González Nieto (QUT: Queensland University of Technology)H-Index: 23
view all 3 authors...
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based environment than their two-pass counterparts. However, there is no ID-based one-pass AKE protocol proposed in the literature with a proof of security in an appropriate model. This paper addresses the current gap by proposing a new ID-based one-pass AKE protocol and proving it secure in a formal model. The security of the new protocol is treated under a model adapted from a formal security model fo...
26 Citations
Sep 9, 2007 in MOBICOM (ACM/IEEE International Conference on Mobile Computing and Networking)
#1Nathanael Thompson (UIUC: University of Illinois at Urbana–Champaign)H-Index: 6
#2Zuoning Yin (UIUC: University of Illinois at Urbana–Champaign)H-Index: 10
Last. Jay P. Singh (DT: Deutsche Telekom)H-Index: 52
view all 5 authors...
A global-scale low cost outdoor Internet access infrastructure is finally attainable. Emerging projects are leveraging the proliferation of private Wi-Fi networks to build a global-scale ubiquitous access infrastructure from autonomous, independently owned Internet connections at homes and other private properties. To ensure the trace ability and accountability required by the broadband ISPs and private owners of these Wi-Fi networks, reliable authentication and authorization are needed. This pa...
10 CitationsSource
#1Guomin Yang (CityU: City University of Hong Kong)H-Index: 24
#2Duncan S. Wong (CityU: City University of Hong Kong)H-Index: 42
Last. Xiaotie Deng (CityU: City University of Hong Kong)H-Index: 40
view all 3 authors...
User privacy is a notable security issue in wireless communications. It concerns about user identities from being exposed and user movements and whereabouts from being tracked. The concern of user privacy is particularly signified in systems which support roaming when users are able to hop across networks administered by different operators. In this paper, we propose a novel construction approach of anonymous and authenticated key exchange protocols for a roaming user and a visiting server to es...
48 CitationsSource
#1Michael Scott (DCU: Dublin City University)H-Index: 28
#2Neil Costigan (DCU: Dublin City University)H-Index: 4
Last. Wesam Abdulwahab (DCU: Dublin City University)H-Index: 2
view all 3 authors...
Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations of Identity-Based Encryption (IBE). In this paper we describe the implementation of various pairings on a contemporary 32-bit smart-card, the Philips HiPerSmartTM, an instantiation of the MIPS-32 based SmartMIPSTM architecture. Three types of pairing are considered, first the standard Tate pairing on a nonsupersingular curve $E...
91 CitationsSource
Cited By2
#1Chayan SarkarH-Index: 8
#2Jan Jaap TreurnietH-Index: 1
Last. Willem de BoerH-Index: 1
view all 5 authors...
In smartcard-based travel payment systems, passengers have to place the smartcard near the journey registration devices once each for check-in and check-out to authenticate their travel. This is an annoying process when if the journey involves multiple stops. In this paper, we describe a working system of secure energy-efficient automatic ticketing (SEAT) for public transport, which transforms traditional check-in/check-out system into Be-in/Be-out system. In SEAT, a Bluetooth low energy (BLE) e...
1 CitationsSource
#1Htoo Aung MawH-Index: 5
#2Hannan XiaoH-Index: 10
Last. James A. MalcolmH-Index: 10
view all 4 authors...
Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security ...
17 CitationsSource