City University of Hong Kong

CityU Institutional Repository >
3_CityU Electronic Theses and Dissertations >
ETD - Dept. of Computer Science  >
CS - Doctor of Philosophy  >

Please use this identifier to cite or link to this item:

Title: Security and privacy in wireless and roaming networks
Other Titles: Wu xian he man you wang luo zhong de an quan yu si yin
Authors: Yang, Guomin (楊國民)
Department: Department of Computer Science
Degree: Doctor of Philosophy
Issue Date: 2009
Publisher: City University of Hong Kong
Subjects: Wireless communication systems -- Security measures.
Roaming (Telecommunication)
Notes: CityU Call Number: TK5103.2 .Y328 2009
vii, 110 leaves 30 cm.
Thesis (Ph.D.)--City University of Hong Kong, 2009.
Includes bibliographical references (leaves 102-110)
Type: thesis
Abstract: With the advancement of mobile technologies, wireless networks have become widely available and interconnected nowadays. However, since wireless transmission is done through the public atmosphere, wireless communications are more vulnerable to various kinds of network attacks. And the low bandwidth of wireless channels and the limited processing resources of wireless devices make it even more challenging to design security modules and protocols for protecting wireless communications. This thesis presents new techniques and methodologies on constructing Authentication and Key Establishment (AKE) protocols, which are a central piece for building secure communication channels, for wireless networks. We investigate several security and privacy issues regarding AKE protocols for wireless communications that lack formal security treatment and are urged to be provided with more promising security solutions. We explore the weaknesses in existing definitions and solutions for these problems and issues, give more formal and well-defined security models and definitions, and provide new solutions with rigorous security analyses and proofs. In particular, we focus on the following problems, We study the problem of two factor authentication and key establishment using mobile devices and passwords. We refine previously proposed security requirements, show the insecurity of some existing schemes, and present a provably secure and practical framework for constructing two factor authentication and key establishment protocols, where a user/client must have the mobile device and know the password in order to be authenticated and get services from the service provider/server. We then investigate the security and privacy issues in roaming networks. We show the insufficiency of existing security treatments for roaming networks and the insecurity of some existing roaming protocols. We also give the first full set of security requirements for anonymous secure roaming, and propose several different solutions. In particular, we propose two Universal Authentication and Key Establishment protocols for anonymous wireless communications. Compared with existing standards and solutions, our protocols greatly reduce system and round complexities, while at the same time provide stronger security and privacy protections for roaming users. We also perform a formal study on the notion of "Anonymous Signature" that is very useful in anonymous wireless communications. We first provide formal definitions for anonymous signature, and show that some popular digital signature schemes cannot provide signer anonymity. We then give extensions to those popular schemes for allowing them to achieve signer anonymity.
Online Catalog Link:
Appears in Collections:CS - Doctor of Philosophy

Files in This Item:

File Description SizeFormat
abstract.html132 BHTMLView/Open
fulltext.html132 BHTMLView/Open

Items in CityU IR are protected by copyright, with all rights reserved, unless otherwise indicated.


Valid XHTML 1.0!
DSpace Software © 2013 CityU Library - Send feedback to Library Systems
Privacy Policy · Copyright · Disclaimer