A novel protocol for software authentication

被引:0
|
作者
He R. [1 ,2 ]
Qin Z. [1 ]
Wu S. [2 ]
机构
[1] School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an
[2] School of Electronic Technology, Information Engineering University, Zhengzhou
关键词
Authentication factor; Authenticity; Reference integrity metric (RIM); Secure boot trusted mobile module;
D O I
10.3923/itj.2010.395.398
中图分类号
学科分类号
摘要
The authenticity and integrity of software running on mobile equipment is relevant and important in m-commerce. Mobile trusted computing can solve the problem by using Reference Integrity Metric (RIM) certificate. But the RIM certificate stored in Mobile Trusted Module (MTM) is suffered to frequently renew while the software is updated or patched. In the study, a user-specific RIM, uRIM, is presented. Based on the uRIM, a novel software integrity verification protocol is proposed. It allows an easy management of RIM to support the secure boot as well as a low-cost on verifying of software authenticity. © 2010 Asian Network for Scientific Information.
引用
收藏
页码:395 / 398
页数:3
相关论文
共 50 条
  • [21] A Novel Authentication and Security Protocol for Wireless Adhoc Networks
    Amin, Umair
    Shah, Munam Ali
    2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 567 - 571
  • [22] A Novel Multi-server Environment Authentication Protocol
    Li Haixia
    Lu Chuiwei
    Sun Sheng
    PROCESSING OF 2014 INTERNATIONAL CONFERENCE ON MULTISENSOR FUSION AND INFORMATION INTEGRATION FOR INTELLIGENT SYSTEMS (MFI), 2014,
  • [23] A novel quantum deniable authentication protocol without entanglement
    Wei-Min Shi
    Jian-Biao Zhang
    Yi-Hua Zhou
    Yu-Guang Yang
    Quantum Information Processing, 2015, 14 : 2183 - 2193
  • [24] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 867 - 876
  • [25] A novel quantum deniable authentication protocol without entanglement
    Shi, Wei-Min
    Zhang, Jian-Biao
    Zhou, Yi-Hua
    Yang, Yu-Guang
    QUANTUM INFORMATION PROCESSING, 2015, 14 (06) : 2183 - 2193
  • [26] A Novel Message Source Authentication Protocol for Multicast Group
    Wan, Changsheng
    Hu, Aiqun
    Zhang, Juan
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 545 - 548
  • [27] A Novel and Efficient Privacy Preserving TETRA Authentication Protocol
    Zahednejad, Behnam
    Azizi, Mahdi
    Pournaghi, Morteza
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 125 - 132
  • [28] Authentication protocol for software and hardware components in distributed electronic signature creation system
    Pejas, Jerzy
    El Fray, Imed
    Rucinski, Andrzej
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (10B): : 192 - 197
  • [29] Passcode Based Authentication Protocol (Part I - Solution Evaluation and Software Design)
    Diaconu, Adrian-Viorel
    2010 3RD INTERNATIONAL SYMPOSIUM ON ELECTRICAL AND ELECTRONICS ENGINEERING (ISEEE), 2010, : 204 - 210
  • [30] A Novel Routing Protocol for Software Defined Radios
    Darabkh, Khalid A.
    Al-Tahaineh, Marwa H.
    Swidan, Andraws I.
    Salameh, Haythem Bany
    2022 9th International Conference on Software Defined Systems, SDS 2022, 2022,