200 likes | 341 Views
Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Date : 2012.10.24 Reporter : Hong Ji Wei Authors : Jun-Sub Kim and Jin Kwak From : International Journal of Security and Its Applications Vol. 6, No. 3, July, 2012. INTRODUCTION. 1.
E N D
Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date:2012.10.24 Reporter : Hong Ji Wei Authors : Jun-Sub Kim and Jin Kwak From : International Journal of Security and Its Applications Vol. 6, No. 3, July, 2012
INTRODUCTION 1 REVIEW OF MUN’S SCHEME 2 WEAKNESS OF MUN’S SCHEME 5 3 3 3 IMPROVED SCHEME CONCLUSION 6 4 4 4 OUTLINE SECURITY ANALYSIS
INTRODUCTION • Lee, Hwang and Liao pointed out some security weaknes- sesin Zhu-Ma’s scheme and presented an improved scheme in 2006. • Wu, Lee and Tsaur pointed out that Leeet al.'s scheme doesn’t achieve all security properties in 2008. • Mun et al. pointed out some security weaknesses in Wuet al.'s scheme and proposed the new improved scheme in 2012. • Kim et al. pointed out that Munet al.'sscheme exist security problems of replay attack and man-in-the-middle attack. So they proposed the new improved scheme in 2012.
REVIEW OF MUN’S SCHEME • Registration HA MU Secure Channel Secure Channel
REVIEW OF MUN’S SCHEME • Authentication and establishment of session key FA HA MU
REVIEW OF MUN’S SCHEME • Update session key FA MU 5
WEAKNESS OF MUN’S SCHEME • Replay attack FA HA MU
WEAKNESS OF MUN’S SCHEME • Man-in-the-middle attack FA HA MU SFA ,a’P ,PFA=(SHA||IDFA||NFA) SMF’ ,b’P 7
IMPROVED SCHEME • Registration MU HA Secure Channel
IMPROVED SCHEME • Authentication and establishment of session key FA HA MU 9
IMPROVED SCHEME • Update session key FA MU 10
SECURITYANALYSIS • Anonymity FA HA MU 11
SECURITYANALYSIS • Provide perfect forward secrecy MU FA
SECURITYANALYSIS • Prevent replay attack FA HA MU 13
SECURITYANALYSIS • Provide mutual authentication between MU and HA FA HA MU 14
SECURITYANALYSIS • Provide mutual authentication between MU and FA FA HA MU 15
SECURITYANALYSIS • Prevent man-in-the-middle attack FA HA MU
CONCLUSION • In this paper, we discussed the security weaknesses in Mun et al.’s scheme, such as a vulnerability to replay attacks and man-in-the-middle attacks. • The scheme achieves many security problems 1.Anonymity 2.Provides perfect forward secrecy 3.Mutual authentication 4.Prevent replay attacks 5.Prevent Man-in-the-middle attacks.