Non-Interactive Authentication and Confidential Information Exchange for Mobile Environments

被引:5
|
作者
Martin-Fernandez, Francisco [1 ]
Caballero-Gil, Pino [1 ]
Caballero-Gil, Candido [1 ]
机构
[1] Univ La Laguna, Dept Comp Engn, Tenerife 38271, Spain
来源
INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15 | 2015年 / 369卷
关键词
Authentication; Security; Internet of things;
D O I
10.1007/978-3-319-19713-5_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing number of devices that can connect to the Internet has given rise to a new concept that is having much impact nowadays, the Internet of Things. Thus, it is necessary to devise innovative security schemes to become accustomed to this new dimension of the Internet, where everything is connected to everything. This paper describes a new scheme for authentication and exchange of confidential information in the non-secure environment of the Internet of Things. The proposal is based on the concept of non-interactive zero-knowledge proofs, allowing that in a single communication, relevant data may be inferred for verifying the legitimacy of network nodes, and for sharing a session key. The proposal has been developed for the platforms built on the Android Open Source Project so it can be used both in smartphones and wearable devices. This paper provides a full description of the design, implementation and analysis of the proposed scheme. It also includes a comparison to similar schemes, which has revealed promising results.
引用
收藏
页码:261 / 271
页数:11
相关论文
共 50 条
  • [41] Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 5 - 13
  • [42] Efficient machine learning over encrypted data with non-interactive communication
    Park, Heejin
    Kim, Pyung
    Kim, Heeyoul
    Park, Ki-Woong
    Lee, Younho
    COMPUTER STANDARDS & INTERFACES, 2018, 58 : 87 - 108
  • [43] An enhanced Kerberos protocol with non-interactive zero-knowledge proof
    Zhu, Yuesheng
    Ma, Limin
    Zhang, Jinjiang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1108 - 1117
  • [44] Multi-path routing scheme for non-interactive multicast communications
    Srinivasan, R.
    Vaidehi, V.
    Ranjani, N.
    Sathya, M.
    Subramani, D.
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, 2006, : 158 - +
  • [45] A Dynamic Identity End-to-End Authentication Key Exchange Protocol for IoT Environments
    Hsu, Chien-Lung
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    Lin, Tzu-Wei
    Lu, Huang-Chia
    2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 133 - 138
  • [46] Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments
    Mohammedi, Mohamed
    Omar, Mawloud
    Bouabdallah, Abdelmadjid
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (05) : 1527 - 1539
  • [47] Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments
    Mohamed Mohammedi
    Mawloud Omar
    Abdelmadjid Bouabdallah
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1527 - 1539
  • [48] Modular square root puzzles: Design of non-parallelizable and non-interactive client puzzles
    Jerschow, Yves Igor
    Mauve, Martin
    COMPUTERS & SECURITY, 2013, 35 : 25 - 36
  • [49] Separating Short Structure-Preserving Signatures from Non-interactive Assumptions
    Abe, Masayuki
    Groth, Jens
    Ohkubo, Miyako
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 628 - 646
  • [50] A new kernel-level key management system for non-interactive processes
    Kwon, M
    Cho, Y
    COMPUTERS AND THEIR APPLICATIONS, 2001, : 462 - 467