SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES

被引:0
|
作者
Wang, Jian [1 ]
Jiang, Nan [2 ,3 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Beijing Normal Univ, Coll Comp Sci, Beijing 100875, Peoples R China
[3] Beijing Jiaotong Univ, Beijing Municipal Comm of Educat, Key Lab Commun & Informat Syst, Beijing, Peoples R China
关键词
mobile device; trusted mobile platform; authentication; authorization;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Future mobile devices are expected to access different networks (such as 3rd generation network, WLAN, Bluetooth, Internet, and etc). Hence many sensitivity data are stored in them. How to protect the security of information and applications about mobile devices becomes an exigent problem. This paper proposes a secure authentication and authorization protocol for mobile devices. The protocol employs biometric identification and password mechanism. Different users could access different information and applications, which are associated with different security levels. Users, mobile equipments and universal subscriber identity module (USIM) could mutual authenticate. Messages are encrypted when they are exchanged.
引用
收藏
页码:207 / +
页数:3
相关论文
共 50 条
  • [1] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [2] Secure and Efficient Mutual Authentication Scheme for NFC Mobile Devices
    You-Han Tung
    Wen-Shenq Juang
    [J]. Journal of Electronic Science and Technology, 2017, 15 (03) : 240 - 245
  • [3] A secure image-based authentication scheme for mobile devices
    Li, Z
    Sun, QB
    Lian, Y
    Giusto, DD
    [J]. ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 751 - 760
  • [4] A Secure and Practical Authentication Scheme Using Personal Devices
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Alrawais, Arwa
    Song, Tianyi
    Cheng, Xiuzhen
    Chen, Dechang
    [J]. IEEE ACCESS, 2017, 5 : 11677 - 11687
  • [5] A Secure Authentication and Key Establishment Scheme for Wearable Devices
    Kim, MyeongHyun
    Lee, JoonYoung
    Yu, SungJin
    Park, KiSung
    Park, Yohan
    Park, YoungHo
    [J]. 2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [6] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [7] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [8] Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid
    Saxena, Neetesh
    Choi, Bong Jun
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 907 - 921
  • [9] Secure File Sharing Scheme for Mobile Devices
    Huang, Kuo-Hsuan
    Chang, En-Chi
    Chang, Chen-Lin
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON NETWORKING AND DISTRIBUTED COMPUTING (ICNDC), 2013, : 82 - 84
  • [10] A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices
    Yoon, Eun-Jim
    Yoo, Kee-Young
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 612 - +