Abstract
Smart and tiny mobile phones are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline networks, there are many security threats to mobile network systems and their impact on the security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified documents which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be important issues when mobile users roam to the mobile networks. In this paper, an anonymous authentication scheme will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still make correct bills to charge these anonymous users. Finally, our protocols also achieve the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.
This research was partially supported by the National Science Council of the ROC (Taiwan) under grant NSC 95-2219-E-110-004.
This work was also supported in part by TWISC@NCKU under grant NSC 94-3114-P-006-001-Y.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Samfat, D., Molva, R., Asokan, N.: Untraceability in mobile networks. In: International Conference on Mobile Computing and Networking, pp. 26–36 (1995)
Hwang, K.F., Chang, C.C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2(2), 400–407 (2003)
Asokan, N.: Anonymity in a mobile computing environment. Mobile Computing System and Applications, 200–204 (December 1994)
Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In: Proceedings of Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, pp. 68–72 (May 2004)
Karygiannis, A., Kiayias, A., Tsiounis, Y.: A solution for wireless privacy and payments based on e-cash. Security and Privacy for Emerging Areas in Communications Networks, 206–218 (September 2005)
He, Q., Wu, D., Khosla, P.: The quest for personal control over mobile location privacy. Communications Magazine, IEEE, 130–136 (May 2004)
Park, S.Y., Han, M.S., Eom, Y.I.: An efficient authentication protocol supporting privacy in mobile computing environments. In: 5th IEEE International Conference on High Speed Networks and Multimedia Communications, pp. 332–334 (July 2002)
Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1), 231–235 (2004)
Kesdogan, D., Fouletier, X.: Secure location information management in cellular radio systems. Wireless Communication System Symposium, IEEE, 35–40 (November 1995)
Lin, W.D., Jan, J.K.: A wireless-based authentication and anonymous channels for large scale area. In: Proceedings of Sixth IEEE Symposium on Computers and Communictions, pp. 36–41 (July 2001)
Schneier, B.: Applied cryptography second edition: protocols, algorithms, and source code in C. Professional, Reference and Trade Group (1996)
Tracz, R., Wrona, K.: Fair electronic cash withdrawal and change return for wireless networks. In: International Workshop on Mobile Commerce, pp. 14–19 (2001)
Jakobsson, M., Yung, M.: Revokable and versatile electronic money. In: Conference on Computer and Communications Security, pp. 76–87 (1996)
Chaum, D.: Blind Signature Systems. In: Advances in Cryptology – CRYPTO 1983, p. 153. Plenum
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 21(2), 120–126 (1978)
Mu, Y., Varadharajan, V.: A new scheme of credit based payment for electronic commerce. In: 23rd Annual IEEE International Conference on Local Computer Networks, pp. 278–284 (October 1998)
Yang, C.-C., Tang, Y.-L., Wang, R.-C., Yang, H.-W.: A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation 169, 1431–1439 (2005)
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fan, CI., Huang, V.SM. (2007). Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications . In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds) Advances in Information and Computer Security. IWSEC 2007. Lecture Notes in Computer Science, vol 4752. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75651-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-540-75651-4_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75650-7
Online ISBN: 978-3-540-75651-4
eBook Packages: Computer ScienceComputer Science (R0)