Public key authentication schemes for local area networks

被引:0
作者
Chen, Tzung-Her [1 ]
Horng, Gwobot [2 ]
Yang, Chuan-Sheng [2 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 402, Taiwan
关键词
security; public key cryptosystems; authentication; key management; certificate; local area network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected. Therefore, verifying the legitimacy of an individual's public key is very important. Most of the key authentication schemes require one or more trustworthy authorities to authenticate the key of a user. Consequently, the system security is mainly dependent on the honesty of these third parties. Unfortunately, a security solution in wide area networks (for example, the Internet) often cannot be applied to local area networks directly without any modification. Sometimes, a complete rebuild is necessary, especially for performance criteria consideration. In this paper, we propose two simple key authentication schemes that require no certification authorities for computer systems in local area networks, in which a host is responsible for user authentication and it uses a designated password authentication mechanism.
引用
收藏
页码:3 / 16
页数:14
相关论文
共 50 条
  • [21] On the Authentication of Certificateless RSA Public Key
    Yang, Wu-Chuan
    Ting, Lien-Yuan
    Kuo, Tzu-Chun
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 378 - 379
  • [22] Public Key Authentication with Memory Tokens
    Vuillaume, Camille
    Okeya, Katsuyuki
    Dahmen, Erik
    Buchmann, Johannes
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 84 - +
  • [23] An Authentication and Key Management Scheme for Heterogeneous Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    Bari, Inam
    Jan, Naveed
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 123 - 131
  • [24] Authentication and Key Establishment in Dynamic Wireless Sensor Networks
    Qiu, Ying
    Zhou, Jianying
    Baek, Joonsang
    Lopez, Javier
    SENSORS, 2010, 10 (04) : 3718 - 3731
  • [25] SIM-based subscriber authentication mechanism for wireless local area networks
    Tsai, Yuh-Ren
    Chang, Cheng-Ju
    COMPUTER COMMUNICATIONS, 2006, 29 (10) : 1744 - 1753
  • [26] AMI Authentication Method based on Hardware Public Key Certificate using Unique Identifier
    Choi, Pil Joo
    Kim, Hyun Il
    Kim, Dong Kyue
    2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 341 - 342
  • [27] An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
    Azees, Maria
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    Nayyar, Anand
    WIRELESS NETWORKS, 2021, 27 (03) : 2119 - 2130
  • [28] An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks
    Maria Azees
    Pandi Vijayakumar
    Marimuthu Karuppiah
    Anand Nayyar
    Wireless Networks, 2021, 27 : 2119 - 2130
  • [29] A Public Key based PMIPv6 Authentication Scheme
    Kim, JaeHyu
    Song, JooSeok
    2014 IEEE/ACIS 13TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2014, : 5 - 10
  • [30] Achieving robust message authentication in sensor networks: a public-key based approach
    Haodong Wang
    Qun Li
    Wireless Networks, 2010, 16 : 999 - 1009