Computer Science ›› 2015, Vol. 42 ›› Issue (3): 111-116.doi: 10.11896/j.issn.1002-137X.2015.03.023

Previous Articles     Next Articles

Non-repudiable Billing Protocol Based on Self-updating Hash Chain for Heterogeneous Wireless Networks

CHEN Shou-guo, FU An-min and QIN Ning-yuan   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The integration of heterogeneous wireless networks (HWNs) is an inevitable trend in the development of next-generation networks.UMTS,LTE,WiMAX,WiFi and other wireless networks compete and cooperate mutually.Secure billing is the primary challenge faced by the commercialization of HWNs.We proposed a non-repudiable billing protocol based on the self-updating hash chain for HWNs.By using the novel self-updating hash chain technology,mobile stations (MS) can quickly update available hash chain which ensures continuous fast authentication.The proposed protocol provides the evidence to solve billing disputes,therefore,it achieves non-repudiation,confidentiality and accuracy in billing.Moreover,the theoretical analysis and performance simulation demonstrate that the proposed protocol has some advantages in aspects of low computational cost,lightweight delay and can meet the performance requirements of HWNs.

Key words: Secure billing,Non-repudiation,Heterogeneous wireless networks,Self-updating hash chain

[1] 姜奇,马建峰,李光松,等.基于WAPI的WLAN 与3G网络安全融合[J].计算机学报,2010,33(9):1675-1685
[2] Prabhavathi P,Nithyanandan L.Network selection in wireless heterogeneous networks[C]∥Proceedings of 2013 International Conference on Communications and Signal Processing.Melmaruvathur,2013:357-361
[3] He Dao-jing,Chen Chun,Bu Jia-jun,et al.Security and Efficiency in Roaming Services for Wireless Networks:Challenges,Approaches,and Prospects[J].IEEE Communications Magazine,2013,51(2):142-150
[4] 傅建庆.面向3G_WLAN互联网络的安全协议研究[D].杭州:浙江大学,2010
[5] Rainer S,Christoph R.On the Security of the Non-Repudiation of Forwarding Service[C]∥Proceedings of 2012 International Conference on Trust,Privacy and Security in Digital Business.Vienna,Austria,2012:167-178
[6] Wu Wei,Zhou Jian-ying,Xiang Yan,et al.How to achieve non-repudiation of origin with privacy protection in cloud computing[J].Journal of Computer and System Sciences,2013,79(8):1200-1213
[7] Xiao Zhi-feng,Xiao Yang,Du D.Non-repudiation in neighborhood area networks for smart grid[J].IEEE Communications Magazine,2013,51(1):18-26
[8] Im T,Lee H,Cho K,et al.Secure Mutual Authentication andFair Billing for Roaming Service in Wireless Mobile Networks[C]∥Proceedings of the Third International Conference on Convergence and Hybrid Information Technology.Busan,2008:466-471
[9] Zhu Hao-jin,Lin Xiao-dong,Shi Ming-hui,et al.PPAB:A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks[J].IEEE Transactions on Vehicular Technology,2009,58(5):2529-2543
[10] Fu An-min,Zhang Yu-qing,Zhu Zhen-chao,et al.An efficienthandover authentication scheme with privacy preservation for IEEE 802.16m network[J].Computers & Security,2012,31(6):741-749
[11] BS ISO/IEC.13888-1/2 Information technology-Security tech-niques- Non-repudiation[S].Switzerland:The Standards Policy and Strategy Committee,2009
[12] Lamport L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772
[13] 瓮佳佳,张敏情,刘昀昊.基于几何方法的自更新Hash链构造方案[J].计算机应用,2010,30(12):3343-3345
[14] 陈孟奇,严新荣,张彬祥.改进的基于自更新哈希链的认证方案[J].信息安全与通信保密,2013(2):73-75
[15] AVISPA Team.European Community under the InformationSociety Technologies Program .http://www.avispa-project.org,2012
[16] The NS-3 Consortium.NS3 tutorial & ns-allinone-3.9.tar.bz2 .http://www.nsnam.org/release/ns-allinone-3.9.tar.bz2,2013

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!