Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments

被引:5
|
作者
Martin-Fernandez, Francisco [1 ]
Caballero-Gil, Pino [1 ]
Caballero-Gil, Candido [1 ]
机构
[1] Univ La Laguna, Dept Comp Engn, Tenerife 38271, Spain
来源
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15 | 2015年 / 369卷
关键词
Authentication; Security; Internet of things;
D O I
10.1007/978-3-319-19713-5_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing number of devices that can connect to the Internet has given rise to a new concept that is having much impact nowadays, the Internet of Things. Thus, it is necessary to devise innovative security schemes to become accustomed to this new dimension of the Internet, where everything is connected to everything. This paper describes a new scheme for authentication and exchange of confidential information in the non-secure environment of the Internet of Things. The proposal is based on the concept of non-interactive zero-knowledge proofs, allowing that in a single communication, relevant data may be inferred for verifying the legitimacy of network nodes, and for sharing a session key. The proposal has been developed for the platforms built on the Android Open Source Project so it can be used both in smartphones and wearable devices. This paper provides a full description of the design, implementation and analysis of the proposed scheme. It also includes a comparison to similar schemes, which has revealed promising results.
引用
收藏
页码:261 / 271
页数:11
相关论文
共 50 条
  • [31] A provably secure lightweight authentication protocol in mobile edge computing environments
    Wu, Tsu-Yang
    Meng, Qian
    Yang, Lei
    Guo, Xinglan
    Kumari, Saru
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12) : 13893 - 13914
  • [32] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [33] Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
    Li, Qiming
    Roy, Sujoy
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2010, 2 (04) : 51 - 62
  • [34] Broadcast encryption based non-interactive key distribution in MANETs
    Yang, Yang
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 533 - 545
  • [35] Non-Interactive and Secure Data Aggregation Scheme for Internet of Things
    Fu, Yanxia
    Ren, Yanli
    Feng, Guorui
    Zhang, Xinpeng
    Qin, Chuan
    ELECTRONICS, 2021, 10 (20)
  • [36] nPPoS: Non-interactive practical proof-of-storage for blockchain
    Heo, Jun Wook
    Ramachandran, Gowri
    Jurdak, Raja
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (04):
  • [37] SAM-PAY: A Location-Based Authentication Method for Mobile Environments
    Berbecaru, Diana Gratiela
    ELECTRONICS, 2025, 14 (03):
  • [38] Efficient and non-interactive ciphertext range query based on differential privacy
    Feng, Peirou
    Sheng, Qitian
    Wang, Jianfeng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2022, 25 (05) : 490 - 503
  • [39] Group Signature Implies PKE with Non-interactive Opening and Threshold PKE
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 181 - +
  • [40] Energy-efficient and non-interactive self-certification in MANETs
    Yi, Jeong Hyun
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4280 : 533 - 547