Wireless Authentication using Remote Passwords

被引:0
|
作者
Harding, Andrew [1 ]
van der Horst, Timothy W. [1 ]
Seamons, Kent E. [1 ]
机构
[1] Brigham Young Univ, Internet Secur Res Lab, Provo, UT 84602 USA
关键词
decentralized wireless authentication; SAW; SRP;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Current wireless authentication mechanisms typically rely on inflexible shared secrets or a heavyweight public-key infrastructure with user-specific digital certificates and, as such, lack general support for environments with dynamic user bases where guest access is frequent. Simple Authentication for the Web (SAW) facilitates dynamic user bases in the context of web site logins by enabling users to authenticate to personal messaging identifiers (e.g., email addresses, IM handles, cell phone numbers). SAW, however, is ill-suited for wireless authentication because, in most cases, it is dependent on client-side Internet connectivity. Wireless Authentication using Remote Passwords (WARP) overcomes this constraint by building a hybrid protocol that combines the principles of SAW authentication with the Secure Remote Password (SRP) protocol.
引用
收藏
页码:24 / 29
页数:6
相关论文
共 50 条
  • [1] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [2] Provably secure RSA-based remote user authentication protocol using passwords
    Wang, Ding
    Wang, Ping
    Li, Zeng-Peng
    Ma, Chun-Guang
    [J]. Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2015, 35 (01): : 191 - 204
  • [3] Authentication Using Session Based Passwords
    Prabhu, Sanket
    Shah, Vaibhav
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 460 - 464
  • [4] Authentication Schemes for Session Passwords using Colors
    Dorage, Nita
    Sawant, Bhakti
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04): : 120 - 123
  • [5] Encoding Passwords using QR Image for Authentication
    Istyaq, Salim
    Umar, Mohammad Sarosh
    [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 818 - 823
  • [6] Two Factor Authentication using EEG Augmented Passwords
    Svogor, Ivan
    Kisasondi, Tonimir
    [J]. PROCEEDINGS OF THE ITI 2012 34TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES (ITI), 2012, : 373 - 378
  • [7] Assessment of Remote Biometric Authentication Systems: Another Take on the Quest to Replace Passwords
    Koehler, Daniel
    Klieme, Eric
    Kreuseler, Matthias
    Cheng, Feng
    Meinel, Christoph
    [J]. 2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 22 - 31
  • [8] PASSWORDS PHILOLOGY, SECURITY, AUTHENTICATION
    Lennon, Brian
    [J]. DIACRITICS-A REVIEW OF CONTEMPORARY CRITICISM, 2015, 43 (01): : 82 - 107
  • [9] USING SMART CARDS TO AUTHENTICATE REMOTE PASSWORDS
    CHANG, CC
    HWANG, SJ
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (07) : 19 - 27
  • [10] PASSWORDS: PHILOLOGY, SECURITY, AUTHENTICATION
    Baetens, Jan
    [J]. LEONARDO, 2019, 52 (02) : 205 - 206