User authentication in mobile computing environment

被引:0
|
作者
Takubo, A
Ishikawa, M
Watanabe, T
Soga, M
Mizuno, T
机构
关键词
mobile-computing; authentication; security; protocol; cryptography;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The computers are connected with each other bq the network as a result of the progress of technology in the field of the computer and network and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time. the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite or the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user TD assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.
引用
收藏
页码:1288 / 1298
页数:11
相关论文
共 50 条
  • [41] Design of USIM-based secure user authentication scheme in a mobile office environment
    Jun-Sub Kim
    Jin Kwak
    [J]. Multimedia Tools and Applications, 2016, 75 : 14541 - 14556
  • [42] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, Srinivasulu U.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1572 - 1595
  • [43] A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment
    Hassan, Alzubair
    Eltayieb, Nabeil
    Elhabob, Rashad
    Li, Fagen
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 592 - 602
  • [44] Design of USIM-based secure user authentication scheme in a mobile office environment
    Kim, Jun-Sub
    Kwak, Jin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14541 - 14556
  • [45] Enhancing Sensor-Based Mobile User Authentication in a Complex Environment by Deep Learning
    Weng, Zhengqiu
    Wu, Shuying
    Wang, Qiang
    Zhu, Tiantian
    [J]. MATHEMATICS, 2023, 11 (17)
  • [46] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [47] Safe user authentication in a network environment
    Uchnar, Matus
    Hurtuk, Jan
    [J]. 2017 IEEE 15TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI), 2017, : 451 - 454
  • [48] Mobile computing environment
    Kurhinen, J.
    [J]. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2002, 58 (9-10): : 120 - 126
  • [49] A simple user authentication scheme for grid computing
    Department of Computer Science and Engineering, Shanghai Jiao Tong University, No.800, Dongchuan Rd., Minghang District, Shanghai, 200240, China
    [J]. Int. J. Netw. Secur, 2008, 2 (202-206):
  • [50] An Improvement of User Authentication Framework for Cloud Computing
    Mun, Jongho
    Kim, Jiye
    Won, Dongho
    [J]. JOURNAL OF COMPUTERS, 2016, 11 (06) : 446 - 454