An Anonymous and Lightweight Authenication Scheme for Mobile Devices

被引:3
作者
Yeh, Kuo-Hui [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Informat Management, Hualien 974, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2015年 / 44卷 / 02期
关键词
Android; Anonymity; Authentication; ECC; Mobile devices; Security; AUTHENTICATED KEY AGREEMENT; ROBUST;
D O I
10.5755/j01.itc.44.2.8335
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a lightweight authentication scheme designed to enable mobile devices to achieve robust client-anonymity and computation efficiency. Instead of the heavy encryption and decryption modules of Elliptic Curve Cryptography (ECC), we adopt the key agreement operation of ECC as the core technique in the proposed anonymous authentication scheme. This eliminates significant computation cost and thus does not exceed the inherent resource-limitations on mobile devices. Security analyses are conducted to guarantee the robustness of the proposed authentication scheme. Moreover, when we implement our proposed scheme, the demo-system we have named AuthDroid, into the Android system, the implementation results demonstrate a practical execution time, e.g. 149.7 microseconds, on an Android-based smartphone, i.e. HTC ONE X, to complete the whole authentication procedure of AuthDroid.
引用
收藏
页码:206 / 214
页数:9
相关论文
共 18 条
[1]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[2]   A Secure Single Sign-On Mechanism for Distributed Computer Networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (01) :629-637
[3]   An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks [J].
Chang, Chin-Chen ;
Tsai, Hao-Chuan .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) :3346-3353
[4]   Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update [J].
Chang, Ya-Fen ;
Tai, Wei-Liang ;
Chang, Hung-Chin .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) :3430-3440
[5]   A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01) :53-59
[6]   Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards [J].
He, Debiao ;
Wang, Ding ;
Wu, Shuhua .
INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02) :170-177
[7]   Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems [J].
Huang, Xinyi ;
Chen, Xiaofeng ;
Li, Jin ;
Xiang, Yang ;
Xu, Li .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) :1767-1775
[8]   An Improved Password-Based Remote User Authentication Protocol without Smart Cards [J].
Jiang, Qi ;
Ma, Jianfeng ;
Li, Guangsong ;
Ma, Zhuo .
INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02) :150-158
[9]   Robust and efficient password-authenticated key agreement using smart cards [J].
Juang, Wen-Shenq ;
Chen, Sian-Teng ;
Liaw, Horng-Twu .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2008, 55 (06) :2551-2556
[10]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772