Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments

被引:5
|
作者
Martin-Fernandez, Francisco [1 ]
Caballero-Gil, Pino [1 ]
Caballero-Gil, Candido [1 ]
机构
[1] Univ La Laguna, Dept Comp Engn, Tenerife 38271, Spain
来源
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15 | 2015年 / 369卷
关键词
Authentication; Security; Internet of things;
D O I
10.1007/978-3-319-19713-5_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing number of devices that can connect to the Internet has given rise to a new concept that is having much impact nowadays, the Internet of Things. Thus, it is necessary to devise innovative security schemes to become accustomed to this new dimension of the Internet, where everything is connected to everything. This paper describes a new scheme for authentication and exchange of confidential information in the non-secure environment of the Internet of Things. The proposal is based on the concept of non-interactive zero-knowledge proofs, allowing that in a single communication, relevant data may be inferred for verifying the legitimacy of network nodes, and for sharing a session key. The proposal has been developed for the platforms built on the Android Open Source Project so it can be used both in smartphones and wearable devices. This paper provides a full description of the design, implementation and analysis of the proposed scheme. It also includes a comparison to similar schemes, which has revealed promising results.
引用
收藏
页码:261 / 271
页数:11
相关论文
共 50 条
  • [21] Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting
    Chakraborty, Suvradip
    Alawatugoda, Janaka
    Rangan, C. Pandu
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 167 - 187
  • [22] An enhanced three-party authentication key exchange protocol for mobile commerce environments
    Tan Z.
    Journal of Communications, 2010, 5 (05): : 436 - 443
  • [23] Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited
    Chen, Yu
    Huang, Qiong
    Zhang, Zongyang
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 274 - 289
  • [24] Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
    Firas Hamila
    Mohammad Hamad
    Daniel Costa Salgado
    Sebastian Steinhorst
    International Journal of Information Security, 2024, 23 : 1131 - 1148
  • [25] HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
    Choudhary, Simran
    Gupta, Anil
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 34
  • [26] IoT Devices with Non-interactive Key Management Protocol
    Gagneja, Kanwalinderjit
    Kiefer, Riley
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [27] Dynamic, Non-Interactive Key Management for the Bundle Protocol
    Van Besien, William L.
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON CHALLENGED NETWORKS (CHANTS '10), 2010, : 75 - 77
  • [28] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 57 - +
  • [29] AUTHENTICATION AND AUTHORIZATION CHALLENGES FOR CONTROLLER-PILOT INFORMATION EXCHANGE USING MOBILE DEVICES
    Diffenderfer, Paul A.
    Baumgartner, Diane M.
    Long, Kevin M.
    Pertsch, Christopher F.
    Iacobucci, Sara D.
    2020 AIAA/IEEE 39TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) PROCEEDINGS, 2020,
  • [30] Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
    Hamila, Firas
    Hamad, Mohammad
    Salgado, Daniel Costa
    Steinhorst, Sebastian
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1131 - 1148