Collins Mtita - Academia.edu (original) (raw)
Uploads
Papers by Collins Mtita
Pervasive computing renders small and inexpensive computing devices as potential players in the I... more Pervasive computing renders small and inexpensive computing devices as potential players in the Internet arena. Independent smart
computing devices collect or generate sensitive information for specific purposes and later relay the information to the designated
servers. The information collected, generated, or transferred require adequate security to ensure confidentiality against adversaries over
the Internet. However, small devices have limited resources to run most classical security protocols.
This article presents a serverless lightweight mutual authentication protocol for resource constrained heterogeneous computing
devices with high mobility. Our solution is novel as it facilitates two resource constrained devices to autonomously perform mutual
authentication and establish a session key without sharing common parameters beforehand. Our proposed lightweight protocol uses
simple primitives such as XoR, comparison and keyed-Hashed Message Authentication Code (HMAC) during mutual authentication
and it also requires minimum storage for storing few keys and parameters locally. The protocol is formally verified using AVISPA tool.
Pervasive computing renders small and inexpensive computing devices as potential players in the I... more Pervasive computing renders small and inexpensive computing devices as potential players in the Internet arena. Independent smart
computing devices collect or generate sensitive information for specific purposes and later relay the information to the designated
servers. The information collected, generated, or transferred require adequate security to ensure confidentiality against adversaries over
the Internet. However, small devices have limited resources to run most classical security protocols.
This article presents a serverless lightweight mutual authentication protocol for resource constrained heterogeneous computing
devices with high mobility. Our solution is novel as it facilitates two resource constrained devices to autonomously perform mutual
authentication and establish a session key without sharing common parameters beforehand. Our proposed lightweight protocol uses
simple primitives such as XoR, comparison and keyed-Hashed Message Authentication Code (HMAC) during mutual authentication
and it also requires minimum storage for storing few keys and parameters locally. The protocol is formally verified using AVISPA tool.