Authentication Protocol Research Papers - Academia.edu (original) (raw)

31 Followers

Recent papers in Authentication Protocol

In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations. This can be used to fully recover the secret IDIDID of the RFID tag, which is the value the protocol is designed to... more

In this work we present the first passive attack over the SASI lightweight authentication protocol with modular rotations. This can be used to fully recover the secret IDIDID of the RFID tag, which is the value the protocol is designed to conceal. The attack is described initially for recovering lfloorlog_2(96)rfloor=6\lfloor log_2(96) \rfloor=6lfloorlog_2(96)rfloor=6 bits of the secret value IDIDID, a result that by itself allows to mount traceability attacks on any given tag. However, the proposed scheme can be extended to obtain any amount of bits of the secret IDIDID, provided a sufficiently large number of successful consecutive sessions are eavesdropped. We also present results on the attack's efficiency, and some ideas to secure this version of the SASI protocol.

Kerberos has become a mature, reliable, secure network authentication protocol. Kerberos is based on secret key encryption technology. It is the native network authentication protocol in the Microsoft Windows 2000 operating system and may... more

Kerberos has become a mature, reliable, secure network authentication protocol. Kerberos is based on secret key encryption technology. It is the native network authentication protocol in the Microsoft Windows 2000 operating system and may be a candidate for use as a general-purpose authentication protocol for large user communities on the Internet. Several proposals have been developed that add public key

Two-way identity authentication is the basis of secure communication in a distributed application environment. A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a... more

Two-way identity authentication is the basis of secure communication in a distributed application environment. A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a complicate and challenging task. This paper examines the characteristics of the security of authentication protocols with TTP, summarizes the essential factors of session key

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route.... more

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by ...

In this paper we consider the problem of document authentication in electronic and printed forms. We formulate this problem from the information-theoretic perspectives and present the joint source-channel coding theorems showing the... more

In this paper we consider the problem of document authentication in electronic and printed forms. We formulate this problem from the information-theoretic perspectives and present the joint source-channel coding theorems showing the performance limits in such protocols. We analyze the security of document authentication methods and present the optimal attacking strategies with corresponding complexity estimates that, contrarily to the existing studies, crucially rely on the information leaked by the authentication protocol. Finally, we present the results of experimental validation of the developed concept that justifies the practical efficiency of the elaborated framework.

This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to... more

This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos is a trusted third-party authentication protocol designed to establish network security. In this paper, we propose a new protocol that is based on enhancements modification of Kerberos and is suited to provide confidentiality, integrity, authentication and authorization. A security analysis of the new protocol is also provided.

A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where opportunistic links between nodes are used to transfer data. An emerging application of DTNs are rural area DTNs, which... more

A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where opportunistic links between nodes are used to transfer data. An emerging application of DTNs are rural area DTNs, which provide Internet connectivity to rural areas in developing regions using conventional transportation mediums, like buses. Potential applications of these rural area DTNs are e-governance, telemedicine and citizen journalism. Therefore, security and privacy are critical for DTNs. Traditional cryptographic techniques based on PKI-certified public keys assume continuous network access, which makes these techniques inapplicable to DTNs. We present the first anonymous communication solution for DTNs and introduce a new anonymous authentication protocol as a part of it. Furthermore, we present a security infrastructure for DTNs to provide efficient secure communication based on identity-based cryptography. We show that our solutions have better performance than existing security infrastructures for DTNs.

The performance of a distributed system is affected by the various functions of its components. The interaction between components such as network nodes, computer systems and system programs is examined with special interest accorded to... more

The performance of a distributed system is affected by the various functions of its components. The interaction between components such as network nodes, computer systems and system programs is examined with special interest accorded to its effect on system reliability. At affordable time and space costs, the analytic hierarchy process (AHP) is used to determine how the reliability of a distributed system may be controlled by appropriately assigning weights to its components. Illustrative case studies, that display the system structure, the assignment of weights and the AHP handling are presented.

A pozsonyi káptalan második örökvallási jegyzőkönyve (1504–1513), forrásközlés

"Vehicle-to-Grid" (V2G) power will be a new green energy scheme in which electric or plug-in hybrid vehicles communicate with the Smart Grid to sell demand response services by either delivering electricity into the grid or by throttling... more

"Vehicle-to-Grid" (V2G) power will be a new green energy scheme in which electric or plug-in hybrid vehicles communicate with the Smart Grid to sell demand response services by either delivering electricity into the grid or by throttling their charging rate. Due to high vehicular speed, sporadic connection, limited communication range, and large volume of data that need to be transmitted, V2G communications have the crucial requirements of fast authentication and encryption/decryption. This paper proposes a unique batch authentication protocol UBAPV2G that takes into account the characteristics of vehicle communication. Security analysis shows that UBAPV2G is strong to against the security attacks. The experimental results show that UBAPV2G can reduce authentication delay, and achieve less computational cost and less communication traffic compared with the one-by-one authentication scheme. Thus, UBAPV2G protocol is suitable for the stringent requirement of real time V2G communication.

The advances in pervasive, ubiquitous and context-aware applications bring new challenges and opportunities for new authentication systems and protocols. Nowadays mobile devices have features that enable richer interaction models,... more

The advances in pervasive, ubiquitous and context-aware applications bring new challenges and opportunities for new authentication systems and protocols. Nowadays mobile devices have features that enable richer interaction models, providing pervasive and ubiquitous multi-factor authentication mechanisms that can be combined in a context-aware and multi-factor authentication environment. State-of-art single sign-on systems and authentication protocols are not well suited for a

Authorization, authentication, and accounting schemes for WiMAX (Worldwide Interoperability for Microwave Access) are the focus of this paper. WiMAX works as a wireless metropolitan area network (MAN) technology, based on IEEE 802.16... more

Authorization, authentication, and accounting schemes for WiMAX (Worldwide Interoperability for Microwave Access) are the focus of this paper. WiMAX works as a wireless metropolitan area network (MAN) technology, based on IEEE 802.16 specifications, which was designed to provide high-throughput wireless broadband connections (up to 70 Mbps for fixed scheme and up to 15 Mbps for mobile scheme) over long distances (up to 30 miles) , which is described as a "framework for the evolution of wireless broadband". The main focus of the authentication and authorization is based on the privacy key management $extensible authentication protocol for pairwise key manegement "EAP-PKM" and the accounting issue

Abstract— Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system,... more

Abstract— Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.

Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the... more

Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the Internet. This paper describes a secure non-interactive deniable authentication protocol using ECDSA signature scheme. The security of the protocol is based on difficulty of breaking Elliptic Curve Discrete Logarithm Problem. It can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor.

We introduce some modiflcations to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak passwords chosen by the network principal that are... more

We introduce some modiflcations to the widely deployed Kerberos authentication protocol. The principle’s secretkey will be independent of the user password to overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Instead, the Kerberos Distribution Center saves a proflle for every instance in its realm to generate the principle’s secret-key by hashing the proflle, and encrypting the output digest. Besides, the lifetime of the secret-key is controlled using the system clock. Triple-Des is used for encryption, SHA-256 for hashing, and Blum Blum Shub for random number generation.

Log In