Filters








19,655 Hits in 3.7 sec

Integrating identity-based and certificate-based authenticated key exchange protocols

Berkant Ustaoğlu
2011 International Journal of Information Security  
Keywords Authenticated key establishment · Certificate-based protocols · ID-based protocols · Shared static state · ID-PKI integration Motivation Authenticated key exchange (AKE), along with public key  ...  These protocols require parties to either hold certificates or rely on identity (ID)-based primitives to achieve authentication.  ...  For authentication, these protocols need certificates: Each party is required to obtain a certificate binding a public key to its identity and at the same time verify validity of peer certificates.  ... 
doi:10.1007/s10207-011-0136-3 fatcat:6awtwuwixbgb3nmggxsmrrccui

Implementation of Certificate Based Authentication in IKEv2 Protocol

Ana Kukec, Stjepan Gros, Vlado Glavinic
2007 Information Technology Interfaces  
The major part of IPsec consists of the Internet Key Exchange protocol, now in its version 2. IKEv2 offers authentication, authorization and key agreement services.  ...  One of the possible authentication mechanisms in this protocol is based on X509 certificates and the PKI infrastructure.  ...  of Croatia, and IKEv2 Step2 project funded by Siemens Networks d.d Zagreb.  ... 
doi:10.1109/iti.2007.4283856 fatcat:b5oxcr7vvbd6pf72cn5tpnjq4a

Security authentication of 3G-WLAN interworking

Yao Zhao, Chuang Lin, Hao Yin
2006 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)  
Then, we present two schemes by applying authentication based on EAP-TLS (Extensible Authentication Protocol -Transport Layer Security) and EAP-TTLS (Tunneled TLS) into integrated 3G and WLAN to achieve  ...  In this paper, we firstly introduce the architectures of 3G-WLAN interworking and discuss existing problems related to authentication and key agreement procedures.  ...  In mutual authentication, each side is required to prove its identity to the other using its certificate and its private key.  ... 
doi:10.1109/aina.2006.300 dblp:conf/aina/ZhaoLY06 fatcat:capc2vww7rcwpok5lurteh3jha

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things.  ...  be authenticated and trusted.  ...  As shown in Table 1 , we classify the applicable proposals on the basis of the authentication (raw public keys, certificate-based and identity-based) and key delivery mechanisms employed.  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Integrating user Identity Management systems with the Host Identity Protocol

Marc Barisch, Alfredo Matos
2009 2009 IEEE Symposium on Computers and Communications  
This paper describes a novel approach to the integration of IdM on the application layer with identity concepts introduced by the Host Identity Protocol (HIP).  ...  The new architecture provides a unified view over user and host identities, enabling the exchange of user and host attributes, while it also provides enhanced security and network features.  ...  Based on the 3GPP Authentication and Key Agreement mechanism, session keys are generated and distributed between the user and the service.  ... 
doi:10.1109/iscc.2009.5202234 dblp:conf/iscc/BarischM09 fatcat:y3bkj4bznrbhtlagvqnx6drw2e

Extensible Authentication Protocol Overview and Its Applications

Heung Youl YOUM
2009 IEICE transactions on information and systems  
EAP is used as a useful tool for enabling user authentication and distribution of session keys.  ...  The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network  ...  It is based on the AKEP2 (Authenticated key exchange protocol 2) [24] .  ... 
doi:10.1587/transinf.e92.d.766 fatcat:bvq4vmrwrve63harw7nsclv4mm

An approach to enhance inter-provider roaming through secret sharing and its application to WLANs

Ulrike Meyer, Jared Cordasco, Susanne Wetzel
2005 Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '05  
In particular, the new concept does not require costly operations for certificate validation by the mobile device.  ...  In addition, we show that the properties of EAP-TLS-KS allow for an efficient integration of a micropayment scheme.  ...  One is RSA encryption based (RSA case) and the other is based on a Diffie-Hellman key exchange (DHE case).  ... 
doi:10.1145/1080730.1080732 dblp:conf/wmash/MeyerCW05 fatcat:7x7a4uoh55czbfh7nxyqfxw22u

Advanced SSL∕TLS-based authentication for secure WLAN-3G interworking

G. Kambourakis, A. Rouskas, G. Kormentzas, S. Gritzalis
2004 IEE Proceedings - Communications  
Existing problems related to authentication and key agreement (AKA) procedures and the extensible authentication protocol (EAP)-AKA, as they appear in the latest 3G and integrated 3G/ Wi-Fi specifications  ...  mechanisms in integrated emerging-3G and Wi-Fi networks.  ...  PEAP is almost identical to EAP-TTLS, relying on the same server-side certificates to authenticate the network and exchange encryption keys.  ... 
doi:10.1049/ip-com:20040835 fatcat:g5hnzggemzhwjcfaasarameof4

Integrated security infrastructures for law enforcement agencies

Nikolai Stoianov, Manuel Urueña, Marcin Niemiec, Petr Machnik, Gema Maestro
2013 Multimedia tools and applications  
cryptographic algorithm that has being integrated into OpenSSL library, and how IBC-enabled TLS/SSL sessions and X.509 certificates are employed to protect INDECT applications.  ...  These security infrastructures can be organized in the following main areas: Public Key Infrastructure (PKI) and user management, communications security, and new cryptographic algorithms.  ...  Acknowledgments This work has been funded by the EU Project INDECT (Intelligent information system supporting observation, searching and detection for security of citizens in urban environment)-grant agreement  ... 
doi:10.1007/s11042-013-1532-7 fatcat:7s5thkxemzh7tjvvjftztxwhhq

Internet security architecture

Refik Molva
1999 Computer Networks  
The paper is addressed to readers with a basic understanding of common security mechanisms including encryption, authentication and key exchange techniques.  ...  First the IPsec architecture including security protocols in the Internet Layer and the related key management proposals are introduced.  ...  The Internet X.509 Public Key Infrastructure work [22] defines public key certificates and certificate management protocols based on the X.509v3 standard.  ... 
doi:10.1016/s1389-1286(98)00016-4 fatcat:7c4yhcoytva43jiqf2lynojlte

Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks [chapter]

Georgios Kambourakis, Angelos Rouskas, Dimitris Gritzalis
2004 Lecture Notes in Computer Science  
Certificate based authentication of parties provides a powerful means for verifying claimed identities, avoiding the necessity of distributing shared secrets beforehand.  ...  authentication mechanisms in integrated emerging-3G and Wi-Fi networks.  ...  As EAP-TLS performs mutual SSL authentication, each side is required to prove its identity to the other using its certificate and its private key.  ... 
doi:10.1007/978-3-540-25980-0_23 fatcat:nium7z774zeytjyz5qgjdqwjuu

Improved Identity Management Protocol for Secure Mobile Cloud Computing

In-Shin Park, Yoon-Deock Lee, Jongpil Jeong
2013 2013 46th Hawaii International Conference on System Sciences  
This paper proposes improved IDM3G [8] to solve user ID management and security problems on mobile internet application services over 3G networks along with an additional authentication management protocol  ...  The proposed I²DM protocol breaks up loads, which are allowed by the existing IDM3G protocol's mutual authentication via mobile operator process, by sending some parts to an Internet application service  ...  It is based on PKI for message integrity and user authentication. Figure 1.  ... 
doi:10.1109/hicss.2013.262 dblp:conf/hicss/ParkLJ13 fatcat:dyxm764ia5hhvcrxnk72prpcfm

Authentication Schemes for Open Distributed Network: A Classification

Deepak Kumar, Vinod Kumar
2013 International Journal of Computer Applications  
The classification is based upon the role of nodes in the authentication function, establishment of certificate, and type of certificate.  ...  An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized .Distributed  ...  One form of non-encryption based identity certificate is information that is hashed using a one-way key-based hash function and the key hold by the requester. .  ... 
doi:10.5120/13181-0855 fatcat:37lqrh4pkrddbimlz3rzdon7bq

Vehicle Authentication via Monolithically Certified Public Key and Attributes [article]

Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
2015 arXiv   pre-print
Vehicle owners are bound to preprocess (periodically) a certificate for both a public key and a list of fixed unchangeable attributes of the vehicle.  ...  Furthermore, the proposed approach is shown to be adaptable with regards to the existing authentication protocols.  ...  Pandu Rangan, Sree Vivek, anonymous reviewers and the editor for valuable comments.  ... 
arXiv:1507.04491v1 fatcat:iusbs77tyjhjpedmemmu5xh4ui

A Lightweight Authentication Protocol for Smart Grid

Qianqian Wu, Meihong Li
2019 IOP Conference Series: Earth and Environment  
In this paper, a protocol for lightweight two-way device authentication of supervisory node and control node in the smart grid is proposed, based on the shared security key and random number, it authenticates  ...  the identity of both communtication parties, using the secruity key embeded in the device chip to determine the legitimacyy of the access device idenitity, avoid the use of certificates and other third-party  ...  So certificate-based authentication not applicable to smart grids. Identity-based authentication. Identity-based authentication has also been applied to smart grid.  ... 
doi:10.1088/1755-1315/234/1/012106 fatcat:l25zkvskvzd3fgy7g34udpp3wq
« Previous Showing results 1 — 15 out of 19,655 results