Public key authentication schemes for local area networks

被引:0
|
作者
Chen, Tzung-Her [1 ]
Horng, Gwobot [2 ]
Yang, Chuan-Sheng [2 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 402, Taiwan
关键词
security; public key cryptosystems; authentication; key management; certificate; local area network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected. Therefore, verifying the legitimacy of an individual's public key is very important. Most of the key authentication schemes require one or more trustworthy authorities to authenticate the key of a user. Consequently, the system security is mainly dependent on the honesty of these third parties. Unfortunately, a security solution in wide area networks (for example, the Internet) often cannot be applied to local area networks directly without any modification. Sometimes, a complete rebuild is necessary, especially for performance criteria consideration. In this paper, we propose two simple key authentication schemes that require no certification authorities for computer systems in local area networks, in which a host is responsible for user authentication and it uses a designated password authentication mechanism.
引用
收藏
页码:3 / 16
页数:14
相关论文
共 50 条
  • [1] A Secure Anonymous Authentication and Key Agreement Schemes for Wireless Body Area Networks
    Vanjarapu, Sahithi
    Yadagiri, Hemanth Kumar
    Gedela, Sireesha
    Suvvada, Sowjanya
    Mylavarapu, Venkata Sai Prasanth
    Rajasekaran, Arun Sekar
    2022 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL, COMPUTING, COMMUNICATION AND SUSTAINABLE TECHNOLOGIES (ICAECT), 2022,
  • [2] 3GPP SIM-BASED AUTHENTICATION SCHEMES FOR WIRELESS LOCAL AREA NETWORKS
    Chang, Chin-Chen
    Wu, Chia-Chi
    Lin, Iuon-Chang
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (02): : 461 - 474
  • [3] Efficient Authentication and Key Management for the Home Area Network
    Nicanfar, Hasen
    Jokar, Paria
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [4] A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks
    Pu, Cong
    Zerkle, Haleigh
    Wall, Andrew
    Lim, Sunho
    Choo, Kim-Kwang Raymond
    Ahmed, Imtiaz
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) : 21136 - 21146
  • [5] Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
    Liu, Jingwei
    Zhang, Zonghua
    Chen, Xiaofeng
    Kwak, Kyung Sup
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 332 - 342
  • [6] A Lightweight Authentication and Key Agreement Schemes for IoT Environments
    Lee, Dae-Hwi
    Lee, Im-Yeong
    SENSORS, 2020, 20 (18) : 1 - 18
  • [7] A survey of broadcast authentication schemes for wireless networks
    Grover, Kanika
    Lim, Alvin
    AD HOC NETWORKS, 2015, 24 : 288 - 316
  • [8] A hierarchical key management and authentication method for wireless sensor networks
    Alimoradi, Pourya
    Barati, Ali
    Barati, Hamid
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (06)
  • [9] Remote Authentication Schemes for Wireless Body Area Networks Based on the Internet of Things
    Saeed, Mutaz Elradi S.
    Liu, Qun-Ying
    Tian, Guiyun
    Gao, Bin
    Li, Fagen
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4926 - 4944
  • [10] An efficient password authentication schemes without using the server public key for grid computing
    Yoon, EJ
    Yoo, KY
    GRID AND COOPERATIVE COMPUTING - GCC 2005, PROCEEDINGS, 2005, 3795 : 149 - 154