A decentralized protocol for mobile control access

被引:0
|
作者
J. A. Alvarez Bermejo
M. A. Lodroman
J. A. Lopez-Ramos
机构
[1] University of Almeria,Department of Informatics
[2] University of Almeria,Department of Mathematics
来源
关键词
Elliptic curves; Diffie–Hellman; Mobile user authentication; Content protection;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we use the Diffie–Hellman key exchange protocol to introduce a decentralized key agreement protocol based on elliptic curves. We do not use any public key infrastructure, which makes it suitable for light devices with low computational and storage capabilities. Thus mobile devices can directly authorize other mobile devices to exchange keys in order to get access to a service or system, in a secure and efficient manner.
引用
收藏
页码:709 / 720
页数:11
相关论文
共 50 条
  • [21] Decentralized Access Control Management for Network Configuration
    Ludwig Seitz
    Göran Selander
    Erik Rissanen
    Cao Ling
    Babak Sadighi
    Journal of Network and Systems Management, 2008, 16 : 303 - 316
  • [22] Privacy aware decentralized access control system
    Shafeeq, Sehrish
    Alam, Masoom
    Khan, Abid
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 420 - 433
  • [23] Decentralized access control scheme for the dynamic group
    Wang, X. M.
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 445 - 450
  • [24] A Cooperative Medium Access Control Protocol for Mobile Clusters in Wireless Body Area Networks
    Wang, Rongli
    Wang, Hui
    Roman, Hector Eduardo
    Wang, Yanxia
    Xu, Dewu
    2013 FIRST INTERNATIONAL SYMPOSIUM ON FUTURE INFORMATION AND COMMUNICATION TECHNOLOGIES FOR UBIQUITOUS HEALTHCARE (UBI-HEALTHTECH), 2013,
  • [25] Study of the medium access control protocol for the multiple channels mobile Ad Hoc network
    School of Telecommunications Engineering, Xidian Univ., Xi'an 710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 2006, 2 (215-217+277):
  • [26] Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID
    Chen, Bing-Chang
    Yang, Cheng-Ta
    Yeh, Her-Tyan
    Lin, Ching-Chao
    APPLIED SCIENCES-BASEL, 2016, 6 (08):
  • [27] On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
    Jarecki, Stanislaw
    Saxena, Nitesh
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) : 739 - 749
  • [28] A schedule-based medium access control protocol for mobile wireless sensor networks
    Ngo, Vincent
    Woungang, Isaac
    Anpalagan, Alagan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2014, 14 (06): : 629 - 643
  • [29] Decentralized control design for welding mobile manipulator
    Tan Tung Phan
    Tan Lam Chung
    Manh Dung Ngo
    Hak Kyeong Kim
    Sang Bong Kim
    Journal of Mechanical Science and Technology, 2005, 19 : 756 - 767
  • [30] Control of Decentralized Geometric Formations of Mobile Robots
    Pruner, E.
    Necsulescu, D.
    Sasiadek, J.
    Kim, B.
    2012 17TH INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN AUTOMATION AND ROBOTICS (MMAR), 2012, : 627 - 632