An inter-domain authentication scheme for pervasive computing environment

被引:16
|
作者
Yao, Lin [1 ,2 ]
Wang, Lei [2 ]
Kong, Xiangwei [1 ]
Wu, Guowei [2 ]
Xia, Feng [2 ]
机构
[1] Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116023, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116023, Peoples R China
关键词
Inter-domain authentication; Key establishment; Biometric Encryption; Signcryption; Pervasive computing; PROTOCOL;
D O I
10.1016/j.camwa.2010.01.010
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a pervasive computing environment, mobile users often roam into foreign domains. Consequently, mutual authentication between the user and the service provider in different domains becomes a critical issue. In this paper, a fast and secure inter-domain authentication and key establishment scheme, namely IDAS, is proposed. IDAS adopts Biometrics to guarantee the uniqueness and privacy of users and adopts signcryption to generate a secure session key. IDAS can not only reduce the burden of certificates management, but also protect the users and authentication servers against fraud. Compared with some other authentication methods, our approach is superior with faster key exchange and authentication, as well as more privacy. The correctness is verified with the Syverson and Van Oorschot (SVO) logic. Crown Copyright (C) 2010 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:234 / 244
页数:11
相关论文
共 50 条
  • [1] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments
    Huo, Shi-Wei
    Luo, Chang-Yuan
    Xin, Hong-Zhi
    [J]. INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
  • [2] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
    Ahene, Emmanuel
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83
  • [3] Fast authentication for inter-domain handover
    Wang, H
    Prasad, AR
    [J]. TELECOMMUICATIONS AND NETWORKING - ICT 2004, 2004, 3124 : 973 - 982
  • [4] A study on secure RFID mutual authentication scheme in pervasive computing environment
    Kang, Soo-Young
    Lee, Deok-Gyu
    Lee, Im-Yeong
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4248 - 4254
  • [5] Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment
    Mohaisen, Abedelaziz
    Chang, Ku-Young
    Hong, Dowon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1684 - 1697
  • [6] An inter-domain authentication mechanism for XMPP/Jabber
    Lee, Lee-Sub
    Choi, KyungSun
    Jeong, Dongwon
    Park, Soo-Hyun
    Kwon, JuHum
    [J]. FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS, PROCEEDINGS, 2006, : 268 - +
  • [7] A Distributed Scheme for Inter-Domain Routing Optimization
    Tomaszewski, Artur
    Pioro, Michal
    Mycek, Mariusz
    [J]. DRCN: 2007 6TH INTERNATIONAL WORKSHOP ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, 2007, : 70 - 77
  • [8] Fast re-authentication protocol for inter-domain roaming
    Komarova, Maryna
    Riguidel, Michel
    Hecker, Artur
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 1960 - 1964
  • [9] An authentication mechanism of digital contents in pervasive computing environment
    Jang, Eun-Gyeom
    Koh, Byoung-Soo
    Choi, Yong-Rak
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 527 - +
  • [10] A method for authentication and key exchange for seamless inter-domain handovers
    Soltwisch, R
    Fu, XM
    Hogrefe, D
    Narayanan, S
    [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 463 - 469