Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Undeniable billing in mobile communication
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Untraceable mobility or how to travel incognito
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Separable and Anonymous Identity-Based Key Issuing
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Deposit-case attack against secure roaming
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Efficient anonymous roaming and its security analysis
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks
IEEE Transactions on Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
Porscha: policy oriented secure content handling in Android
Proceedings of the 26th Annual Computer Security Applications Conference
Hi-index | 0.01 |
Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless networks, we proposed a hierarchical ID-based roaming protocol in this paper. In our scheme, we use a 2-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the roaming user is the end user. With the hierarchical ID-based cryptosystem, we can avoid involvement with home network, and keep the roaming the user's identity private. Furthermore, not only the root authority is relieved from management of a large amount of private/public key pairs, but the domain servers are free to generate key pairs for their registered users. At the same time, we use hash chains together with ID-based signatures to achieve non-repudiation for service payment.