User authentication in mobile computing environment

被引:0
|
作者
Takubo, A
Ishikawa, M
Watanabe, T
Soga, M
Mizuno, T
机构
关键词
mobile-computing; authentication; security; protocol; cryptography;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The computers are connected with each other bq the network as a result of the progress of technology in the field of the computer and network and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time. the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite or the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user TD assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.
引用
收藏
页码:1288 / 1298
页数:11
相关论文
共 50 条
  • [1] Mobile user authentication system in cloud environment
    Yeh, Her-Tyan
    Chen, Bing-Chang
    Wu, Yi-Cong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1161 - 1168
  • [2] Trusted computing based user authentication for mobile equipment
    Zheng, Yu
    He, Da-Ke
    He, Ming-Xing
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
  • [3] User Authentication using Profiling in Mobile Cloud Computing
    Jeong, Hoon
    Choi, Euiin
    [J]. AASRI CONFERENCE ON POWER AND ENERGY SYSTEMS, 2012, 2 : 262 - 267
  • [4] Waving Gesture Analysis for User Authentication in the Mobile Environment
    Shen, Chao
    Wang, Zhao
    Si, Chengxiang
    Chen, Yufei
    Su, Xiaojie
    [J]. IEEE NETWORK, 2020, 34 (02): : 57 - 63
  • [5] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [6] Trusted computing based open environment user authentication model
    Cyber Security Cluster, MIMOS Berhad, Technology Park Malaysia, Kuala Lumpur, Malaysia
    不详
    [J]. ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):
  • [7] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    [J]. 2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [8] User Authentication Protocol Based on the Location Factor for a Mobile Environment
    Bartlomiejczyk, Maciej
    El Fray, Imed
    Kurkowski, Miroslaw
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    [J]. IEEE ACCESS, 2022, 10 : 16439 - 16455
  • [9] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    [J]. Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
  • [10] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22