Netinfo Security ›› 2018, Vol. 18 ›› Issue (7): 29-35.doi: 10.3969/j.issn.1671-1122.2018.07.004

• Orginal Article • Previous Articles     Next Articles

Research on a Dual-stealth Mechanism of User Identity and Location in Accessing Wireless Network

A-yong YE(), Qing LI, Junlin JIN, Lingyu MENG   

  1. College of Mathematics and Informatics, Fujian Normal University, Fuzhou Fujian 350007, China
  • Received:2018-03-05 Online:2018-07-15 Published:2020-05-11

Abstract:

Because of the inherent "user-terminal-BS-location" spatio-temporal mapping relationship between user location and wireless network, the end-to-end anonymous authentication can't solve the leakage problem of location privacy. This paper uses the idea of fuzzification to construct the identity authentication model with k-anonymous set identity, which replaces the unique identity in existing protocols and achieves double anonymity protection of user identity and device identity for BS. On this basis, the trusted third party is introduced to cut off the direct correlation between the server and BS, shield the mapping relationship between the user and the accessed BS, and solve the location privacy problem of the server, so as to achieve double-stealth protection of the user identity and location. In the stealth access mechanism, random factors and hash operations are introduced to resist a variety of network attacks. This paper analyzes the feasibility and safety of the scheme from a theoretical point of view.

Key words: wireless network, stealth access, anonymous authentication, identity-based cryptosystem

CLC Number: