User authentication in mobile computing environment

被引:0
|
作者
Takubo, A
Ishikawa, M
Watanabe, T
Soga, M
Mizuno, T
机构
关键词
mobile-computing; authentication; security; protocol; cryptography;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The computers are connected with each other bq the network as a result of the progress of technology in the field of the computer and network and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time. the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite or the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user TD assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.
引用
收藏
页码:1288 / 1298
页数:11
相关论文
共 50 条
  • [21] EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment
    Zhu, Tiantian
    Weng, Zhengqiu
    Song, Qijie
    Chen, Yuan
    Liu, Qiang
    Chen, Yan
    Lv, Mingqi
    Chen, Tieming
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (02) : 555 - 572
  • [22] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    [J]. PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [23] An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Chen, Hang
    Shen, Wei
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [24] A Study on Authentication System Using QR Code for Mobile Cloud Computing Environment
    Oh, Dong-Sik
    Kim, Bong-Han
    Lee, Jae-Kwang
    [J]. FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 500 - +
  • [25] A User-Adaptive Augmented Reality System in Mobile Computing Environment
    Oh, Sejin
    Byun, Yung-Cheol
    [J]. SOFTWARE AND NETWORK ENGINEERING, 2012, 413 : 41 - +
  • [26] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [27] An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
    Wang, Chenyu
    Ding, Ke
    Li, Bin
    Zhao, Yiming
    Xu, Guoai
    Guo, Yanhui
    Wang, Ping
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [28] Graphical User Authentication Algorithm for Mobile Banking User
    Ugochukwu, Ejike Ekeke Kingsley
    Jusoh, Yusmadi Yah
    Yasin, Sharifah Md
    Abdullah, Azizol
    Abdullah, Salfarina
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5182 - 5186
  • [29] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    [J]. COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [30] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61