An inter-domain authentication scheme for pervasive computing environment

被引:16
|
作者
Yao, Lin [1 ,2 ]
Wang, Lei [2 ]
Kong, Xiangwei [1 ]
Wu, Guowei [2 ]
Xia, Feng [2 ]
机构
[1] Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116023, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116023, Peoples R China
关键词
Inter-domain authentication; Key establishment; Biometric Encryption; Signcryption; Pervasive computing; PROTOCOL;
D O I
10.1016/j.camwa.2010.01.010
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a pervasive computing environment, mobile users often roam into foreign domains. Consequently, mutual authentication between the user and the service provider in different domains becomes a critical issue. In this paper, a fast and secure inter-domain authentication and key establishment scheme, namely IDAS, is proposed. IDAS adopts Biometrics to guarantee the uniqueness and privacy of users and adopts signcryption to generate a secure session key. IDAS can not only reduce the burden of certificates management, but also protect the users and authentication servers against fraud. Compared with some other authentication methods, our approach is superior with faster key exchange and authentication, as well as more privacy. The correctness is verified with the Syverson and Van Oorschot (SVO) logic. Crown Copyright (C) 2010 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:234 / 244
页数:11
相关论文
共 50 条
  • [21] Understanding the Inter-Domain Presence of Research Topics in the Computing Discipline
    Datta, Subhajit
    Lakdawala, Rumana
    Sarkar, Santonu
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (01) : 366 - 378
  • [22] An Inter-domain Routing and Signaling Scheme for Optical Mesh Networks
    Lei Wang
    Xiaoping Zheng
    Hanyi Zhang
    Yili Guo
    [J]. Photonic Network Communications, 2005, 9 : 157 - 166
  • [23] An inter-domain routing and signaling scheme for optical mesh networks
    Wang, L
    Zheng, XP
    Zhang, HY
    Guo, YL
    [J]. PHOTONIC NETWORK COMMUNICATIONS, 2005, 9 (02) : 157 - 166
  • [24] A practical and robust inter-domain marking scheme for IP traceback
    Gao, Zhiqiang
    Ansari, Nirwan
    [J]. COMPUTER NETWORKS, 2007, 51 (03) : 732 - 750
  • [25] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222
  • [26] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
  • [27] Fast re-authentication for inter-domain handover using context transfer
    Alfandi, Omar
    Brosenne, Henrik
    Werner, Constantin
    Hogrefe, Dieter
    [J]. 2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2008, : 434 - 438
  • [28] An authentication protocol for pervasive computing
    Li, SQ
    Zhou, JY
    Li, XX
    Chen, KF
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
  • [29] Research on Beidou-based Inter-domain Identity Authentication for Mobile Object
    Yan Jie
    Lu Yu
    Liu Yunlong
    Chen Liyun
    [J]. PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 923 - 926
  • [30] Transaction-based authentication and key agreement protocol for inter-domain VoIP
    Battistello, Patrick
    Garcia-Alfaro, Joaquin
    Deletre, Cyril
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1579 - 1597