Public key authentication schemes for local area networks

被引:0
作者
Chen, Tzung-Her [1 ]
Horng, Gwobot [2 ]
Yang, Chuan-Sheng [2 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
[2] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 402, Taiwan
关键词
security; public key cryptosystems; authentication; key management; certificate; local area network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected. Therefore, verifying the legitimacy of an individual's public key is very important. Most of the key authentication schemes require one or more trustworthy authorities to authenticate the key of a user. Consequently, the system security is mainly dependent on the honesty of these third parties. Unfortunately, a security solution in wide area networks (for example, the Internet) often cannot be applied to local area networks directly without any modification. Sometimes, a complete rebuild is necessary, especially for performance criteria consideration. In this paper, we propose two simple key authentication schemes that require no certification authorities for computer systems in local area networks, in which a host is responsible for user authentication and it uses a designated password authentication mechanism.
引用
收藏
页码:3 / 16
页数:14
相关论文
共 50 条
  • [31] Achieving robust message authentication in sensor networks: a public-key based approach
    Wang, Haodong
    Li, Qun
    [J]. WIRELESS NETWORKS, 2010, 16 (04) : 999 - 1009
  • [32] Achieving robust message authentication in sensor networks: a public-key based approach
    Haodong Wang
    Qun Li
    [J]. Wireless Networks, 2010, 16 : 999 - 1009
  • [33] Efficient Anonymous Authentication for Wireless Body Area Networks
    Li, Chuang
    Xu, Chunxiang
    [J]. IEEE ACCESS, 2022, 10 : 80015 - 80026
  • [34] A survey on security and authentication in wireless body area networks
    Narwal, Bhawna
    Mohapatra, Amar Kumar
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 113
  • [35] A Taxonomy of Key Management Schemes of Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 690 - 696
  • [36] A Survey on Key Distribution Schemes in Wireless Sensor Networks
    Liu, He
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ADVANCED ICT, (ICAICTE 2014), 2014, : 24 - 27
  • [37] A survey of key management schemes in wireless sensor networks
    Xiao, Yang
    Rayi, Venkata Krishna
    Sun, Bo
    Du, Xiaojiang
    Hu, Fei
    Galloway, Michael
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2314 - 2341
  • [38] Key management schemes and protocols for wireless sensor networks
    Su, Zhong
    Lin, Chuang
    Feng, Fu-Jun
    Ren, Feng-Yuan
    [J]. Ruan Jian Xue Bao/Journal of Software, 2007, 18 (05): : 1218 - 1231
  • [39] Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey
    Ali, Ikram
    Hassan, Alzubair
    Li, Fagen
    [J]. VEHICULAR COMMUNICATIONS, 2019, 16 : 45 - 61
  • [40] Key management schemes in wireless sensor networks: A survey
    [J]. 1600, IEEE Computer Society : 813 - 820