이동 컴퓨팅 환경에서의 익명성과 불추적성 지원 기법

A Scheme for Providing Anonymity and Untraceability in Mobile Computing Environments

  • 최선영 (성균관대학교 전기전자및컴퓨터공학부) ;
  • 박상윤 (성균관대학교 전기전자및컴퓨터공학부) ;
  • 엄영익 (성균관대학교 전기전자및컴퓨터공학부)
  • 발행 : 2001.12.31

초록

이동 네트워크 상에서의 인터넷 서비스가 활성화됨에 따라 이동 호스트에 대한 인증 및 비밀성이 요구되었고, 이동 호스트의 이동성에 따른 익명성 및 불추적성이 중요한 고려사항이 되었다. 본 논문에서는 이동 호스트가 도메인간을 이동하면서 노출될 수 있는 이동 호스트의 Identity의 보호를 위해 사용자 Alias를 사용하였으며, 원격 도메인에도 Alias를 사용함으로 익명성 보장 및 불추적성을 지원한 안전한 인증 프로토콜을 제시한다. 본 논문에서는 안전성을 높이기 위해서 Alias 생성시 공개키 암호 시스템을 이용하였다.

In recent years, Internet-based application services on the mobile environment have been activated, and the developments of mobile internet application for user authentication and privacy have been required. Especially, the research for preventing disclosure of identity caused by user mobility is on the progress. In this paper, we introduce the study of an authentication protocol for anonymity and untraceability supporting the protection of user identity and the authenticated secure association mechanism between mobile hosts and remote domains. In this protocol use public cryptography.

키워드

참고문헌

  1. D. Samfat, R. Molva and N. Asokan, 'Untracealibity in Mobile Networks,' MobiCom '95, November, 1995 https://doi.org/10.1145/215530.215548
  2. Willian Stallings, CRYFTOGRAPYH AND NETWORK SECURITY: Principles and Practice, 2nd ed. Prentice-Hall, 1999
  3. Jungjoon Kim, Mina Oh, and Taegun Kim, 'Security Requirements of Next Generation Wireless Communications,' Communication Technology Proceedings, 1998 https://doi.org/10.1109/ICCT.1998.743402
  4. Y. Frankel, A. Herzberg, P. A. Karger, H. Krawczyk, C. A. Kunzinger, M. Yung, 'Security Issues in a CDPD Wireless Network,' IEEE Personal Communications, Vol. 2, No.4, Aug. 1995 https://doi.org/10.1109/98.403454
  5. G. Pierce and C. Paar, 'Recent Developments in Digital Wireless Network Security,' Technical conference on Telecommunications Research and Development in Massachusetts, Lowell, March 12, 1996
  6. Min-Shiang H, Yuan-Liang Tang and Heng-Chi Lee, 'An efficient authentication protocol for GSM networks,' UROCOMM 2000. Inforamation Systems for Inhanced Public Safety and Securi IEEE/ AFCEA, 2000 https://doi.org/10.1109/EURCOM.2000.874826
  7. Refik Molva Didier Smafat, Gene Tsudik, 'Authentication of Mobile Users,' IEEE Network, Social Issue on Mobile Communication Technologies, Vol. 8, No. w, March/April 1994 https://doi.org/10.1109/65.272938
  8. R. Molva, G. Tsudik, E. Van Herreweghen, S. Zatti, 'KryptoKnight Authentication and Key Distribution System,' Proceedings of ESORICS'92, November 1992
  9. Michael Burrows et al., 'A Logic of Authentication,' Digital System Research Center, Tchinical Report 39, February 1990, May 1994