Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








615 Hits in 7.4 sec

Authentication for 5G Mobile Wireless Networks

Daphne Bunga Dwiputriane, Swee Huay Heng
2022 Journal of Engineering Technology and Applied Physics  
This paper surveys the state of 5G mobile wireless networks in terms of authentication.  ...  It further discusses the security features and challenges in the 5G mobile wireless networks, and future directions will also be charted.  ...  In a research study aligned with the concept of multi-server architecture, He et al. proposed a protocol to authenticate user with the presence of a self-certified public key cryptography [23] .  ... 
doi:10.33093/jetap.2022.4.1.3 fatcat:nqtl26ehq5flplq72czv4boy5q

Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey

Vani Rajasekar, Premalatha Jayapaul, Sathya Krishnamoorthi, Muzafer Saračević
2021 Acta Polytechnica Hungarica  
, and Multi-server applications.  ...  Although intensive efforts were made in designing remote user authentication scheme for health care, IoT, Multi-server and cloud applications, the majority of these applications suffers either from security  ...  They developed this scheme for 5G multi-server networks and uses ECC for self-certified public-key cryptography.  ... 
doi:10.12700/aph.18.3.2021.3.5 fatcat:z6m33sofgngg3e4xr2zwfxm5ta

Self-organized key management with trusted certificate exchange in MANET

Saju P John, Philip Samuel
2015 Ain Shams Engineering Journal  
The proposed architecture consists of one coordinator node, servers and normal mobile nodes. The coordinator acts as a mediator for transmitting the message among the servers and mobile nodes.  ...  Each node generates its own public/private key pairs using server-signed public keying technique.  ...  [9] have proposed a robust and efficient key exchange protocol for node authentication in a MANET based on multi-path communication.  ... 
doi:10.1016/j.asej.2014.09.011 fatcat:zj2ceqknvvhdldkvmzhz4yuuve

Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks [chapter]

Jaydip Sen
2012 Applied Cryptography and Network Security  
Authentication using identity-based cryptography Identity-based cryptography (IBC) is a public key cryptography in which public key of a user is derived from some publicly available unique identity information  ...  The OR acts as a proxy to the mobile user and constructs an onion route consisting of other ORs using the public keys of the routers.  ...  Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks, Applied Cryptography and Network Security, Dr.  ... 
doi:10.5772/39176 fatcat:lvh54ipvizdo3drqtro2qbhece

An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments

Shudong Li, Xiaobo Wu, Dawei Zhao, Aiping Li, Zhihong Tian, Xiaodong Yang, Hua Wang
2018 PLoS ONE  
OPEN ACCESS Citation: Li S, Wu X, Zhao D, Li A, Tian Z, Yang X (2018) An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments.  ...  To compensate for these shortcomings, we propose a novel dynamic IDbased remote user authentication scheme for multi-server environments based on pairing and self-certified public keys.  ...  Simultaneously, Liao and Hsiao proposed a novel non-RC-dependent multi-server remote user authentication scheme using self-certified public keys for mobile clients [27] . Recently, Chou et al.  ... 
doi:10.1371/journal.pone.0202657 fatcat:2pywnxh26fgntl772b4uc6cgeq

Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues [article]

Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab, Helge Janicke
2019 arXiv   pre-print
This paper presents a comprehensive investigation of authentication schemes for smart mobile devices.  ...  In addition, we provide a taxonomy and comparison of authentication schemes for smart mobile devices in the form of tables. Finally, we identify open challenges and future research directions.  ...  cryptosystem, self-certified public keys, certificateless signature, and homomorphic encryption.  ... 
arXiv:1803.10281v2 fatcat:yjkohnh3qje3zk2yzp5xoakzfi

A Blockchain-Based Privacy-Awareness Authentication Scheme with Efficient Revocation for Multi-Server Architectures

Ling Xiong, Fa-gen Li, Sheng-ke Zeng, Tu Peng, Zhi-cai Liu
2019 IEEE Access  
Over the past two decades, a series of multi-server authentication schemes without communication with the online registration center in each authentication phase using the self-certified public key cryptography  ...  In this work, we apply the idea of blockchain technology to construct a privacy-awareness authentication scheme for the multi-server environment, which can achieve distributed registry and efficient revocation  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the Associate Editor for providing constructive and generous feedback.  ... 
doi:10.1109/access.2019.2939368 fatcat:c55rpt73jzg5fjxprkjujes7uq

Table of contents

2016 IEEE Transactions on Information Forensics and Security  
Zhou 1940 Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures ....................................................  ...  Libraries are permitted to photocopy for private use of patrons, provided the per-copy fee of $31.00 is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.  ... 
doi:10.1109/tifs.2016.2579579 fatcat:rkc5uiczczhbfhbpihcj7xxpmy

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy.  ...  The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables.  ...  The main idea of [74] is the use of Self-Certified Public-Key, which need not be accompanied by a separate digital certificate.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment [article]

Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang
2013 arXiv   pre-print
s multi-server authentication scheme which is based on pairing and self-certified public keys, and propose a novel dynamic ID based remote user authentication scheme for multi-server environments.  ...  s multi-server authentication scheme and proposed a novel smart card and dynamic ID based remote user authentication scheme for multi-server environments.  ...  At the same time, Liao and Hsiao proposed a novel non-RC dependented multi-server remote user authentication scheme using self-certified public keys for mobile clients [27] . Recently, Chou et al.  ... 
arXiv:1305.6350v1 fatcat:mrchtkxbrrc43k5wpkgjzzy6aq

Key Management for Beyond 5G Mobile Small Cells: A Survey

Marcus De Ree, Georgios Mantas, Ayman Radwan, Shahid Mumtaz, Jonathan Rodriguez, Ifiok E. Otung
2019 Zenodo  
Therefore, this paper surveys the state-of-the-art key management schemes proposed for similar network architectures (e.g., mobile ad hoc networks and ad hoc device-to-device networks) that decentralize  ...  Furthermore, these key management schemes are evaluated for adaptability in a network of mobile small cells.  ...  The use of self-certifying keys [116] was proposed in [117] since these require nodes to contact servers only once.  ... 
doi:10.5281/zenodo.4424737 fatcat:uzik7hfuj5db5k7sabfdi62xee

Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

D. Prabakaran, Shyamala Ramachandran
2022 Computers Materials & Continua  
The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server.  ...  Authentication (MFA) using authentication credentials and biometric identity.  ...  Table 2: Algorithm for registration and key agreement using elliptical curve cryptography Algorithm for registration and key agreement using elliptical curve cryptography 1) The AS i with its identity  ... 
doi:10.32604/cmc.2022.019591 fatcat:4id5fkw6h5fs7c7gk4eqnx54dm

DiscoverFriends: Secure Social Network Communication in Mobile Ad Hoc Networks [article]

Joshua Joy, Eric Chung, Zengwen Yuan, Leqi Zou, Jiayao Li, Mario Gerla
2016 arXiv   pre-print
DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized public-key management scheme to securely identify friends and provide authentication.  ...  Finally, to the best of our knowledge, DiscoverFriends implements and evaluates the first Android multi-hop WiFi direct protocol using IPv6.  ...  As for asymmetric cryptography, a public/private key pair is generated using a RSA algorithm, in which key sizes are 1024 bits.  ... 
arXiv:1505.07487v2 fatcat:qm3kmeavxzd7tezusx7cxbvpa4

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks

Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai
2012 IEEE Communications Surveys and Tutorials  
It also discusses future directions and open problems of general Identity-Based Cryptography and its application in mobile ad hoc networks.  ...  In this survey, we review all papers that are available in the literature on security schemes on mobile ad hoc networks using Identity-Based Cryptography during years 2001 to 2007.  ...  They suggest the of use MAC address as node identity. The lightweight IDAKE protocol provides secure and efficient authentication and key exchange for two network nodes.  ... 
doi:10.1109/surv.2011.020211.00045 fatcat:bcgqnhfzxrdvlfoq6tmucsjdea

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented.  ...  Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication  ...  A security analysis of the protocol has shown that the protocol ensures: (i) user anonymity, (ii) anonymous authentication of a user with an authentication server (AS) and also anonymous authentication  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y
« Previous Showing results 1 — 15 out of 615 results