Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments

被引:5
|
作者
Martin-Fernandez, Francisco [1 ]
Caballero-Gil, Pino [1 ]
Caballero-Gil, Candido [1 ]
机构
[1] Univ La Laguna, Dept Comp Engn, Tenerife 38271, Spain
来源
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15 | 2015年 / 369卷
关键词
Authentication; Security; Internet of things;
D O I
10.1007/978-3-319-19713-5_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing number of devices that can connect to the Internet has given rise to a new concept that is having much impact nowadays, the Internet of Things. Thus, it is necessary to devise innovative security schemes to become accustomed to this new dimension of the Internet, where everything is connected to everything. This paper describes a new scheme for authentication and exchange of confidential information in the non-secure environment of the Internet of Things. The proposal is based on the concept of non-interactive zero-knowledge proofs, allowing that in a single communication, relevant data may be inferred for verifying the legitimacy of network nodes, and for sharing a session key. The proposal has been developed for the platforms built on the Android Open Source Project so it can be used both in smartphones and wearable devices. This paper provides a full description of the design, implementation and analysis of the proposed scheme. It also includes a comparison to similar schemes, which has revealed promising results.
引用
收藏
页码:261 / 271
页数:11
相关论文
共 50 条
  • [1] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [2] Non-interactive certificate update protocol for efficient authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 (113): : 132 - 144
  • [3] Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks
    Ibrahim, Maged Hamada
    Kumari, Saru
    Das, Ashok Kumar
    Odelu, Vanga
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5563 - 5580
  • [4] Efficient non-interactive deniable authentication protocols
    Qian, HF
    Cao, ZF
    Wang, LC
    Xue, QS
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 673 - 679
  • [5] Non-interactive Certificate Update Protocol for Efficient Authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,
  • [6] Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments
    Walshe, Marcus
    Epiphaniou, Gregory
    Al-Khateeb, Haider
    Hammoudeh, Mohammad
    Katos, Vasilios
    Dehghantanha, Ali
    AD HOC NETWORKS, 2019, 95
  • [7] A non-interactive deniable authentication scheme based on designated verifier proofs
    Wang, Bin
    Song, ZhaoXia
    INFORMATION SCIENCES, 2009, 179 (06) : 858 - 865
  • [8] Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
    Martin-Fernandez, Francisco
    Caballero-Gil, Pino
    Caballero-Gil, Candido
    SENSORS, 2016, 16 (01):
  • [9] A Non-Interactive Dual Channel Continuous Traffic Authentication Protocol
    Irakiza, David
    Karim, Md E.
    Phoha, Vir V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1133 - 1140
  • [10] Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things
    Ashutosh Dhar Dwivedi
    Rajani Singh
    Uttam Ghosh
    Raghava Rao Mukkamala
    Amr Tolba
    Omar Said
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 4639 - 4649