IDENTITY-BASED ROAMING PROTOCOL WITH ANONYMITY FOR HETEROGENEOUS WIRELESS NETWORKS

Identity-based roaming protocol with anonymity for heterogeneous wireless networks

Identity-based roaming protocol with anonymity for heterogeneous wireless networks

Blog Article

The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity MACA+CACAO impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.

Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the Laptop Sleeves protocol interaction and it is more efficient.

Report this page