Time-assisted authentication protocol

被引:5
作者
Bilal, Muhammad [1 ]
Kang, Shin-Gak [1 ]
机构
[1] Univ Sci & Technol, Elect & Telecommun Res Inst, Daejeon, South Korea
关键词
authentication; CSP; key distribution; network security; rank functions; NETWORKS;
D O I
10.1002/dac.3309
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Authentication is the first step toward establishing a service provider and customer association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence. This work presents a secure and lightweight keying and authentication protocol suite termed time-assisted authentication protocol (TAP). The TAP improves the security of protocols with the assistance of time-based encryption keys and scales down the authentication complexity by issuing a reauthentication ticket. While moving across the network, a mobile customer node sends a reauthentication ticket to establish new sessions with service-providing nodes. Consequently, this reduces the communication and computational complexity of the authentication process. In the keying protocol suite, a key distributor controls the key generation arguments and time factors, while other participants independently generate a keychain based on key generation arguments. We undertake a rigorous security analysis and prove the security strength of TAP using communicating sequential processes and rank function analysis.
引用
收藏
页数:16
相关论文
共 28 条
[1]  
[Anonymous], INT J COMMUNICATION
[2]  
[Anonymous], RFC4120
[3]  
Bilal M, US patent, App, Patent No. [15/348,480, 15348480]
[4]   Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks [J].
Chang, I-Pin ;
Lee, Tian-Fu ;
Lin, Tsung-Hung ;
Liu, Chuan-Ming .
SENSORS, 2015, 15 (12) :29841-29854
[5]  
Cremers C, 2006, THEORETICAL COMPUTER, V367, P1
[6]  
Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]  
Fraser Nicholas A., 2007, C P IEEE INT C COMM
[9]  
Golle P, 2008, AUTHENTICATING STREA
[10]  
Juels A, C P NETW DISTR SYST