JMT_V1_N2_RP5
Privacy Preserving Authentication Using Anonymous Roaming Protocol
V. Padmavathi
S. Kavitha
A. Arthi
R. Gayathri
A. Deepika
Journal on Mobile Applications and Technologies
2394-0239
1
2
26
34
Anonymity, Authentication, Canetti-Krawczyk (CK) model, Privacy, Revocation, Secure Roaming
The secure roaming service, the foreign server must authenticate the roaming User, who originally subscribed to the home server. Hence, an authentication mechanism is currently important in the requirement for providing secure roaming services and protect the location privacy of users on anonymous authentication. The anonymous authentication process is without participating the home server on efficiency communication for existing work. The process of authentication causes high computation costs and huge revocation lists. So the authors proposed a novel three-round anonymous roaming protocol. The proposed protocol uses a pseudo-identity-based signcryption scheme and using CK-model to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the storage in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols.
May - July 2014
Copyright © 2014 i-manager publications. All rights reserved.
i-manager Publications
http://www.imanagerpublications.com/Article.aspx?ArticleId=3172