A Novel Variable K-Pseudonym Scheme Applied to 5G Anonymous Access Authentication

06/14/2021
by   Dong Ma, et al.
0

Anonymous access authentication schemes provide users with massive application services while protecting the privacy of users' identities. The identity protection schemes in 3G and 4G are not suitable for 5G anonymous access authentication due to complex computation and pseudonym asynchrony. In this paper, we consider mobile devices with limited resources in the 5G network and propose an anonymous access authentication scheme without the Public Key Infrastructure. The anonymous access authentication scheme provides users with variable shard pseudonyms to protect users' identities asynchronously. With the variable shared pseudonym, our scheme can ensure user anonymity and resist the mark attack, a novel attack aimed at the basic k-pseudonym scheme. Finally, we analyze the scheme with BAN logic analysis and verify the user anonymity.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/01/2020

An Efficient Anonymous Authentication Scheme Using Registration List in VANETs

Nowadays, Vehicular Ad hoc Networks (VANETs) are popularly known as they...
research
02/20/2018

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

Authentication and authorization are critical security layers to protect...
research
07/31/2020

Password-authenticated Decentralized Identities

Password-authenticated identities, where users establish username-passwo...
research
01/26/2023

LemonLDAP::NG – A Full AAA Free Open Source WebSSO Solution

Nowadays, security is becoming a major issue and concern. More and more ...
research
08/28/2018

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

For many years, the pay-TV system has attracted a lot of users. Users ha...
research
04/21/2021

How to Identify and Authenticate Users in Massive Unsourced Random Access

Identification and authentication are two basic functionalities of tradi...
research
10/29/2020

SANS: Self-sovereign Authentication for Network Slices

5G communications proposed significant improvements over 4G in terms of ...

Please sign up or login with your details

Forgot password? Click here to reset