An adaptive and transient authentication protocol for mobile device

被引:0
|
作者
Chen, Tzung-Her [1 ]
Hung, Tsung-Hao [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 60004, Taiwan
来源
WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS | 2007年
关键词
transient authentication; user authentication; forward secrecy; multi-user environment;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent decade, the various mobile devices make our life better. The growth of the mobility technology makes the mobile device more powerful and cheaper. Through these mobile devices, people can do their works efficiently. However, ubiquitous mobile devices have potential security risks. The mobile devices may be used by an unauthorized user or stolen more easily than fixed computers when the owner does not stay nearby. In 2006, Nicholson et al. proposed a transient authentication mechanism which is convenient and friendly for the user to work on mobile devices. However, the mechanism does not provide the authentication protocol in details. This paper reviews their mechanism briefly and provides different authentication protocols for various scenarios. The proposed schemes provide mutual authentication, guarantee the confidentiality of the security-sensitive files within the mobile device against unauthorized access. The authentication protocols are efficient since only the pseudo random number generator and one-way hash function are involved for mutual authentication. At the same time, the present protocols are adaptively suitable for lightweight computation devices. In addition, the proposed protocols also meet forward secrecy.
引用
收藏
页码:147 / 151
页数:5
相关论文
共 50 条
  • [1] Mobile device security using transient authentication
    Nicholson, Anthony J.
    Corner, Mark D.
    Noble, Brian D.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (11) : 1489 - 1502
  • [2] An improved authentication protocol for mobile agent device in RFID environment
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2012, 10 (05) : 508 - 520
  • [3] Adaptive protocol for entity authentication and key agreement in mobile networks
    Zhang, MX
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 166 - 183
  • [4] An authentication protocol offering service anonymity of mobile device in ubiquitous environment
    Park, Jong Hyuk
    JOURNAL OF SUPERCOMPUTING, 2012, 62 (01): : 105 - 117
  • [5] An authentication protocol offering service anonymity of mobile device in ubiquitous environment
    Jong Hyuk Park
    The Journal of Supercomputing, 2012, 62 : 105 - 117
  • [6] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [7] Authentication in transient storage device attachments
    Rich, Donald
    COMPUTER, 2007, 40 (04) : 102 - 104
  • [8] An improved NFC device authentication protocol
    Lu, He-Jun
    Liu, Dui
    PLOS ONE, 2021, 16 (08):
  • [9] Secure Authentication Protocol for Mobile Payment
    Kai Fan
    Hui Li
    Wei Jiang
    Chengsheng Xiao
    Yintang Yang
    TsinghuaScienceandTechnology, 2018, 23 (05) : 610 - 620
  • [10] An optimized authentication protocol for mobile networks
    Mahshid, Mir-Kamran
    Eslamipoor, Reza
    NEURAL COMPUTING & APPLICATIONS, 2014, 25 (02): : 379 - 385