A novel protocol for software authentication

被引:0
|
作者
He R. [1 ,2 ]
Qin Z. [1 ]
Wu S. [2 ]
机构
[1] School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an
[2] School of Electronic Technology, Information Engineering University, Zhengzhou
关键词
Authentication factor; Authenticity; Reference integrity metric (RIM); Secure boot trusted mobile module;
D O I
10.3923/itj.2010.395.398
中图分类号
学科分类号
摘要
The authenticity and integrity of software running on mobile equipment is relevant and important in m-commerce. Mobile trusted computing can solve the problem by using Reference Integrity Metric (RIM) certificate. But the RIM certificate stored in Mobile Trusted Module (MTM) is suffered to frequently renew while the software is updated or patched. In the study, a user-specific RIM, uRIM, is presented. Based on the uRIM, a novel software integrity verification protocol is proposed. It allows an easy management of RIM to support the secure boot as well as a low-cost on verifying of software authenticity. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:395 / 398
页数:3
相关论文
共 50 条
  • [1] Maille authentication - A novel protocol for distributed authentication
    Fritz, A
    Paris, JF
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 309 - 322
  • [2] SafeFlow: Authentication Protocol For Software Defined Networks
    Allouzi, Maha Ali
    Khan, Javed I.
    2018 IEEE 12TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2018, : 374 - 376
  • [3] A Novel Authentication Protocol for Vehicle Network
    Peng, Xiong
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 664 - 668
  • [4] A novel certificateless deniable authentication protocol
    Jin, Chunhua
    Xu, Chunxiang
    Li, Fagen
    Zhang, Xiaojun
    International Journal of Computers and Applications, 2015, 37 (3-4) : 181 - 192
  • [5] Advanced Authentication Protocol for Software-Defined Networks
    Allouzi, Maha Ali
    Khan, Javed, I
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2018, 12 (03) : 361 - 371
  • [6] A Software Integrity Authentication Protocol for Zero Trust Architecture
    Liu, Wenyi
    Zhang, Zheng
    Qiao, Xu
    Li, Yuanzhang
    Tan, Yu-an
    Meng, Weizhi
    PROCEEDINGS OF THE2024 SIGCOMM WORKSHOP ON ZERO TRUST ARCHITECTURE FOR NEXT GENERATION COMMUNICATIONS, ZTA-NEXTGEN 2024, 2024, : 1 - 6
  • [7] A novel secure group RFID authentication protocol
    GUO Cong
    ZHANG Zi-jian
    ZHU Lie-huang
    TAN Yu-an
    YANG Zhen
    The Journal of China Universities of Posts and Telecommunications, 2014, 21 (01) : 94 - 103
  • [8] A Novel Bidirectional RFID Identity Authentication Protocol
    Xie, Songyou
    Liang, Wei
    Xu, Jianbo
    Tang, Mingdong
    Weng, Tien-Hsiung
    Li, Kuan-Ching
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 301 - 307
  • [9] A novel hybrid authentication protocol for roaming users
    Ba-Rukab, OM
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: CONTROL, COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 300 - 303
  • [10] A novel broadcast authentication protocol for internet of vehicles
    Ruan, Na
    Li, Mengyuan
    Li, Jie
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (06) : 1331 - 1343