Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/54458
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGoh, Yong Rui.
dc.date.accessioned2013-06-20T07:55:43Z
dc.date.available2013-06-20T07:55:43Z
dc.date.copyright2013en_US
dc.date.issued2013
dc.identifier.urihttp://hdl.handle.net/10356/54458
dc.description.abstractAuthentication protocols are an extremely important aspect of a secure network connection. In essence, authentication protocols serve as the first layer of defence against malicious attacks by authenticating different groups of entities that wish to communicate with each other securely. The study and research of a strong authentication protocol is of intense interest recently due to the sheer popularity of communication devices that is present in our communication network today. This report will take a closer look at an authentication scheme that can be used in a category of networks defined as the Global Mobility Networks (GLOMONETS). It will attempt to explain the definition of GLOMONETS through discussing the network structure and its characteristics. Following which, this report will look specifically at an authentication scheme named Enhanced Authentication with Anonymity for Roaming Service (EAARS) proposed by other researchers in the past. Although the EAARS scheme can be effective in the authentication of different entities and also protect the communication channel to a large extent, the report will present some of the loopholes that are present in the existing scheme. To go one step further, the report will present an enhancement to the EAARS scheme by incorporating a form of asymmetric key generation named Simple Password Exponential Key Exchange (SPEKE) into the scheme. Following which, the report will evaluate the enhanced scheme by comparing it against some malicious attacks. Formal verification will also be presented in the form of a simulation using Coloured Petri Nets. Finally, the report will be concluded with some of the future work and directions that can be possible to further improve the authentication scheme.en_US
dc.format.extent55 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systemsen_US
dc.titleIdentity-based anonymous remote authentication scheme for GLOMONETSen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorMa Maodeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
dc.contributor.organizationInfineon Technologies Asia Pacific Pte. Ltd.en_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
EB5083-121.pdf
  Restricted Access
Final Report1.83 MBAdobe PDFView/Open

Page view(s)

281
Updated on Aug 13, 2022

Download(s)

5
Updated on Aug 13, 2022

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.