Filters








12,692 Hits in 4.1 sec

Object Authentication in the Context of the Internet of Things: A Survey

Maha Saadeh, Azzam Sleit, Khair Eddin Sabri, Wesam Almobaideen
2020 Journal of Cyber Security and Mobility  
Comparisons are based on various criteria which include authentication process characteristics, the underlying architecture, key generation and distribution techniques, supporting IoT challenges, security  ...  Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services.  ...  Moreover, except for [30, 36, 37] , registration/offline phases are essential phases in the authentication process.  ... 
doi:10.13052/jcsm2245-1439.932 fatcat:2mufoqa6rjfqhh2p2bd7wwabyy

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services

Rafael Torres Moreno, Jorge Bernal Bernabe, Jesús García García Rodríguez, Tore Kasper Frederiksen, Michael Stausholm, Noelia Martínez, Evangelos Sakkopoulos, Nuno Ponte, Antonio Skarmeta
2020 Sensors  
To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied  ...  both to online and offline scenarios.  ...  Upon successful authentication towards the identity providers, there are now two possible scenarios. (1) Distributed token generation/signing (for SSO) and (2) distributed P-ABC, mainly for offline scenarios  ... 
doi:10.3390/s20030945 pmid:32050726 pmcid:PMC7038966 fatcat:ocild5srwndkrco6agnbzk4bru

DEPLOYING OBLIVIOUS PERSONALIZED MOBILE ID PREVIEW

Georgia Sourla, Evangelos Sakkopoulos
2020 Zenodo  
Standardization towards a common scheme is important to ensure wide-spread adoption through cross-country and cross-region interoperability.  ...  An advanced design for P-ABCs are distributed P-ABCs (dP-ABC). The dP-ABC Credential Management module on the IdP needs to manage the cryptographic material for the scheme.  ...  ObLivious Identity and Management for Private and User-friendly Services [9] are privacy-preserving identity provision services that use distributed cryptography to distribute the functionality and cryptographic  ... 
doi:10.5281/zenodo.5815964 fatcat:4fourqyf5fdxdc3d5smg7zo2ga

Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks

Albert Wasef, Rongxing Lu, Xiaodong Lin, Xuemin Shen
2010 IEEE wireless communications  
., achieving data authentication and non-repudiation). For entity authentication, the public key of each entity must be authentic to all the entities in the network.  ...  From the table, we can see the fast verification of the online/offline Rabin scheme makes it more suitable for the efficient authentication required in VANETs.  ... 
doi:10.1109/mwc.2010.5601954 fatcat:zj2y23tuurgrbjdsha2omo2qsm

A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data

Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi
2020 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)  
Firstly, we discussed an overview of Identity management approaches, introducing an architecture overview as well as the relevant actors in such a system and blockchain technology as solution for distributed  ...  The authentication and verification of digital identity is essential to achieve the privacy and security of distributed digital identities.  ...  For distributed authentication (verification and lookup), certcoin has exploited the kademlia DHT [36] for self-sustaining key-distributor service.  ... 
doi:10.1109/brains49436.2020.9223312 dblp:conf/brains/GilaniBHC20 fatcat:bqud3palbncrxetmx7g444qrk4

Authentication and encryption in the Snow disease surveillance network

Johan Gustav Bellika, Lars Ilebrekke, Per Atle Bakkevoll, Håvard Johansen, Jeremiah Scholl, Monika Alise Johansen
2009 Studies in Health Technology and Informatics  
Requirements for the authentication mechanism were collected from General Practitioners (GPs).  ...  The paper presents how authentication and encryption is implemented in the Snow disease surveillance network.  ...  Because the outbreak management system is the natural place for administering distribution of vaccines, the information distributed within this system needs to be protected.  ... 
pmid:19745406 fatcat:fbitrnrqm5gd7fa6n7vqnxoxny

Reliable OSPM schema for secure transaction using mobile agent in micropayment system

N. Chitra Kiran, G. Narendra Kumar
2013 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)  
However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce (  ...  The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments.  ...  For the empirical analysis, let us consider X ID as false name of assumed X party in offline-transaction system distributed by Mobile-agent (M a ), Pub_Key X be public key of X, DS X be digital signature  ... 
doi:10.1109/icccnt.2013.6726503 fatcat:ug6ibosv4rcqfdcgwtcfrz4hgi

On Security Analysis of Recent Password Authentication and Key Agreement Schemes Based on Elliptic Curve Cryptography

Prabhdeep Kaur, Sheetal Kalra
2015 Journal of Technology Management for Growing Economies  
Secure and efficient mutual authentication and key agreement schemes form the basis for any robust network communication system.  ...  In this paper, we have analyzed some of the recent password based authentication and key agreement schemes using ECC for various environments.  ...  For the purpose of confidentiality and authentication, public key cryptosystems have advantage over symmetric key cryptosystems as they eliminate the problem of key distribution and digital signatures.  ... 
doi:10.15415/jtmge.2015.61004 fatcat:bldktspbibdtvioxpmwnvrraoe

Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis

Haowen Tan, Yuanzhao Song, Shichang Xuan, Sungbum Pan, Ilyong Chung
2019 Symmetry  
Note that a symmetric key mechanism is adopted for the further data transmission.  ...  For the above consideration, we present a secure certificateless D2D authenticating mechanism intended for extreme scenarios in this paper.  ...  Offline Registration Phase The offline registration phase is designed for the D2D initialization, which can be divided into the essential key information management and UE registration.  ... 
doi:10.3390/sym11080969 fatcat:nr33qhzrk5dgrpsdeyulbrifxe

Securing Mobile Ad hoc Networks: Key Management and Routing

Kamal Kumar Chauhan
2012 International Journal on AdHoc Networking Systems  
Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management.  ...  Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes  ...  PROPOSED KEY MANAGEMENT SCHEME In this section, we proposed key management system for group based MANETs. Proposed key management scheme includes key generation, distribution and revocation phase.  ... 
doi:10.5121/ijans.2012.2207 fatcat:aqkbaklb4jathjwndh5ctrbuny

Towards security and QoS optimization in real-time embedded systems

Kyoung-Don Kang, Sang H. Son
2006 ACM SIGBED Review  
To minimize the overhead, we derive the appropriate QoS levels for several key lengths via an offline polynomial time algorithm.  ...  When the risk level is raised online, a real-time task can use a longer key and adapt to the corresponding QoS level (derived offline) in O(1) time.  ...  Our offline precomputation algorithm for a specific key length is summarized and discussed as follows. 1.  ... 
doi:10.1145/1279711.1279718 fatcat:fnipigwsxjhezcx6ycwwoxxici

Secure password authentication schemes and their applications
漏えいに強いパスワード認証とその応用

Kazukuni KOBARA, SeongHan SHIN
2014 Synthesiology English edition  
Passwords are widely used for encrypting files, authenticating remote users on a communication network, and establishing encrypted channels for authenticated users.  ...  As countermeasures to "heard or peeked" and "lax setting and management of password," it is recommended to employ twofactor authentication where information other than passwords is used concurrently, in  ...  The proposed title is vague and can include all the papers for new authentication and key management that may appear in the future so that you cannot catch the reader's attention.  ... 
doi:10.5571/syntheng.7.174 fatcat:l3xga473lrf3xeoi6js5nyd2ge

Towards name-based trust and security for content-centric network

Xinwen Zhang, Katharine Chang, Huijun Xiong, Yonggang Wen, Guangyu Shi, Guoqiang Wang
2011 2011 19th IEEE International Conference on Network Protocols  
For scalable deployment purpose, we further propose to use a hybrid scheme combined with traditional public-key infrastructure (PKI) and IBC.  ...  The trust of a content is seamlessly integrated with the verification of the content's integrity and authenticity with its name or prefix, instead of the public key certificate of its publisher.  ...  Specifically, a PKG generates and distributes private keys for clients in its local domain or autonomous system (AS), while existing deployed PKI-based trust management infrastructure (e.g., that for DNSSEC  ... 
doi:10.1109/icnp.2011.6089053 dblp:conf/icnp/ZhangCXWSW11 fatcat:qtosxasupzcqjdhwj54iktbs74

Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution [chapter]

Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
2005 Lecture Notes in Computer Science  
In particular, two major security problems of overlay multicast, network access control and group key management, are addressed.  ...  We first present a bandwidthefficient scheme, called CRBR, that seamlessly integrates network access control and group key management.  ...  They can use their pairwise key for authenticating these KEEPALIVE messages to each other. C.  ... 
doi:10.1007/11496137_4 fatcat:km3krqmuh5hmvaqj3jhoeaxewm

HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks

Ankush Singla, Anand Mudgerikar, Ioannis Papapanagiotou, Attila A. Yavuz
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
Specifically, we developed a cryptographic hardware-acceleration framework for Rapid Authentication (RA) [1], which is a delay-aware offline-online signature scheme for command and control systems.  ...  In this paper, we developed Hardware-Accelerated Authentication (HAA) that enables practical realization of delay-aware signatures for vehicular networks.  ...  Acknowledgment We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Tesla K40 GPU and Tesla K1 used for this research.  ... 
doi:10.1109/milcom.2015.7357624 dblp:conf/milcom/SinglaMPY15 fatcat:u2awzmoz5ne67eu73ixugdeoka
« Previous Showing results 1 — 15 out of 12,692 results