Journal Press India®

Efficient Anonymity Authentication Using Quorum Sensing Protocol in Wireless Mobile Networks

Vol 3 , Issue 2 , April - June 2015 | Pages: 54-58 | Research Paper  

https://doi.org/10.51976/ijari.321513

| | |


Author Details ( * ) denotes Corresponding author

1. * A. Sindhuja, Department of Computer Science Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, Tamil Nadu, India (sindhu110415@gmail.com)
2. J. Sasi Devi, Department of Computer Science Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, Tamil Nadu, India
3. R. Aarthy, Department of Computer Science Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, Tamil Nadu, India

In secure roaming service, the foreign server must authenticate the roaming user, who originally subscribed to the home server. Hence, an authentication mechanism is currently important requirement for providing secure roaming services and protects the location privacy of users on unidentified authentication. The unidentified authentication will process without participating the home server on efficiency communication for existing work. The process of authentication increases high computation costs and huge revocation lists. The novel three-round anonymous (unidentified) roaming protocol uses a pseudo-identity-based signcryption scheme and using CK-model to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the storage in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols.

Keywords

Home Server; Roaming Server; Signcryption Algorithm; Quorum Sensing Protocol; Unidentified Authentication; Wireless Mobile Networks


  1. C. Y. Chow, M. F. Mokbel, T. He, A privacy-preserving loca- tion monitoring system for wireless sensor networks, IEEE Trans. Mobile Comput., 10(1), 2011, 94–107

  2. B. Gedik, L. Liu, Protecting location privacy with person- alized k-anonymity: Architecture and algorithms, IEEE Trans. Mobile Comput., 7(1), 2008, 1–18

  3. D. He, J. Bu, S. Chan, C. Chen, M. Yin, Privacy-preserving universal authentication protocol for wireless communications, IEEE Trans. Wireless Commun., 10(2), 2011, 431–436

  4. Hyo Jin sssJo, Jung Ha Paik, Dong Hoon Lee, Fellow, IEEE Efficient Privacy-Preserving Authentication in Wireless Mobile Networks, 13(7), 2014

  5. K. Mehta, D. Liu, M. Wright, Protecting location privacy in sensor networks against a global eavesdropper, IEEE Trans. Mobile Comput., 11(2), 2011, 320–336

  6. H. Mun, K. Han, Y. S. Lee, C. Y. Yeun, H. H. Choi, Enhanced secure anonymous authentication scheme for roaming service in global mobility networks, Math. Comput. Model., 55(1–2), 2012, 214–222

  7. A. Shen, S. Guo, D. Zeng, G. Mohsen, A lightweight privacy- preserving protocol using chameleon hashing for secure vehicular communications, IEEE WCNC, Shanghai, China, 2012, 2543–2548

  8. Security Aspects, ETSI GSM 02.09, 1993

  9. Y. Sun, T. La Porta, P. Kermani, A flexible privacy enhanced location-based services system framework and practice, IEEE Trans. Mobile Comput., 8(3), 2009, 304–321

  10. 3rd Generation Partnership Project, Technical Specification Group Services and System Aspects; 3G Security; Network Domain Security; IP Network Layer Security, 3GPP TS 33.210 V5.5.0, 2003

  11. G. Yang, D. S. Wong, X. Deng, Anonymous and authenti- cated key exchange for roaming networks, IEEE Trans. Wireless Commun., 6(9), 2007, 3461–3472

  12. G. Yang, D. S. Wong, X. Deng, Formal security definition and efficient construction for roaming with a privacy-preserving extension, J. Universal Comput. Sci., 14(3), 2008, 441–462

  13. H. Zhu, X. Lin, M. Shi, P.-H. Ho, X. Shen, PPAB: A privacy preserving authentication and billing architecture for metropoli- tan area sharing networks, IEEE Trans. Veh. Technol., 58(5), 2009, 2529–2543

  14. H. Zhu, W. Pan, B. Liu, H. Li, A lightweight anonymous authentication scheme for VANET based on bilinear pairing, 4th Int. Conf. INCoS Bucharest, Romania, 2012, 2012, 222–228

  15. D. He, C. Chen, S. Chan, J. Bu, Secure and efficient handover authentication based on bilinear pairing functions, IEEE Trans. Wireless Commun., 11(1), 2012, 48–53

Abstract Views: 1
PDF Views: 128

Advanced Search

News/Events

Indira School of Bus...

Indira School of Mangement Studies PGDM, Pune Organizing Internatio...

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.