Access Authentication - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Access Authentication

The Experts below are selected from a list of 47007 Experts worldwide ranked by ideXlab platform

Access Authentication – Free Register to Access Experts & Abstracts

Jin Cao – One of the best experts on this subject based on the ideXlab platform.

  • LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
    IEEE Internet of Things Journal, 2020
    Co-Authors: Jin Cao, Zheng Yan, Yinghui Zhang

    Abstract:

    As a development of the next generation of mobile communication networks and systems (5G), the Third-Generation Partnership Project (3GPP) committee has standardized a new 5G Authentication and key-agreement (5G-AKA) protocol to ensure the Access security of a mobile equipment. However, there are still some security vulnerabilities in the 5G-AKA protocol, and there is no Authentication protocol proposed for massive device concurrent connection by the 3GPP working groups. In this article, we propose a novel lightweight and secure Access Authentication scheme named lightweight secure Access Authentication (LSAA) that contains two lightweight extended Chebyshev chaotic maps-based Access Authentication protocols for two types of 3GPP standard mobile devices: 1) common user equipment (UE) and 2) massive machine-type communication (mMTC) devices. Our proposed protocols can achieve several security functionalities, including mutual Authentication, session-key establishment, identity privacy protection, and perfect forward/backward secrecy (PFS/PBS). In addition, the proposed protocols are lightweight in nature compared with the 5G-AKA. In order to comprehensively and accurately evaluate LSAA, we carry out formal security analysis by employing two formal verification tools Proverif and Scyther, and informal security analysis on the proposed protocols. We further evaluate the performance of the proposed protocols with regard to Authentication signaling cost, Authentication communication cost, Authentication computational cost, and Authentication storage cost. The security evaluation and performance analysis results show that our proposed protocols can provide advanced security and high efficiency.

  • LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks
    IEEE Internet of Things Journal, 2020
    Co-Authors: Jin Cao, Dengguo Feng

    Abstract:

    Space information network (SIN), which has the characteristics of large capacity, high reliability, and wide coverage, can be effectively applied to the Internet of Things (IoT) business. However, SIN is vulnerable to various attacks due to its highly exposed links, and the power and processing capacity of satellites and IoT devices (IoTDs) are usually limited. Meanwhile, massive IoTDs connecting to SIN in an instant incur a severe signaling congestion and there is no Authentication protocol proposed for massive IoTDs in SIN. In this article, we first propose a novel semi-aggregated signature mechanism and session key agreement mechanism. Then, based on the above two mechanisms, we propose a novel Access Authentication scheme named lattice-based Access Authentication (LAA) which contains two types of lattice-based Authentication protocols: 1) LAA for massive IoTDs and 2) LAA for a single IoTD. The security analysis by employing the formal provable security analysis, the automation verification tool named Scyther, the Burrows–Abadi–Needham-logic, and the informal security analysis demonstrate that our proposed protocols successfully achieve these security properties, including mutual Authentication, conditional anonymity, unlinkability, data confidentiality, data integrity, unforgeability, undeniability, key establishment, perfect forward/backward secrecy (PFS/PBS), and resistance against protocol attacks and quantum attacks. We further evaluate the performance of our proposed protocols with regard to signaling overhead, transmission overhead, computational overhead, and Authentication delay, which shows that our proposed protocols can provide high efficiency.

  • anti quantum fast Authentication and data transmission scheme for massive devices in 5g nb iot system
    IEEE Internet of Things Journal, 2019
    Co-Authors: Jin Cao, Pu Yu, Xinyin Xiang, Hui Li

    Abstract:

    The narrowband Internet of Things (NB-IoT) system has become an integral part of the future fifth generation (5G) network. Although the NB-IoT system has gradually been improved in the traditional LTE network currently, the NB-IoT system does not have an effective Access Authentication scheme in the future 5G network. According to the current 3rd Generation Partnership Project (3GPP) standard, NB-IoT devices still use the traditional Access Authentication method to perform mutual Authentication with the network, which may bring a large amount of signaling and communication overhead. This problem will be magnified in a large-scale device environment in the future 5G network. In this article, a quantum resistance Access Authentication and data distribution scheme is proposed for large-scale NB-IoT devices. The scheme can simultaneously implement Access Authentication and data transmission of a group of NB-IoT devices based on the lattice-based homomorphic encryption technology. Our scheme not only greatly reduce the network burden but also achieve strong security, including privacy protection and anti-quantum attacks. The performance analysis results show that our scheme has the ideal efficiency.

Ashley Moye – One of the best experts on this subject based on the ideXlab platform.

  • ResearchGuides. Database Troubleshooting Guide. Secure Connection Errors.
    , 2011
    Co-Authors: Ashley Moye

    Abstract:

    This guide provides troubleshooting tips and solutions to the some of the most common Access issues our patrons encounter, including off-campus Access, Authentication problems, PDF display issues, and secure connection errors.

  • ResearchGuides. Database Troubleshooting Guide. Common Problems.
    , 2011
    Co-Authors: Ashley Moye

    Abstract:

    This guide provides troubleshooting tips and solutions to the some of the most common Access issues our patrons encounter, including off-campus Access, Authentication problems, PDF display issues, and secure connection errors.

  • ResearchGuides. Database Troubleshooting Guide. When All Else Fails….
    , 2011
    Co-Authors: Ashley Moye

    Abstract:

    This guide provides troubleshooting tips and solutions to the some of the most common Access issues our patrons encounter, including off-campus Access, Authentication problems, PDF display issues, and secure connection errors.

Pang Liaojun – One of the best experts on this subject based on the ideXlab platform.

  • Security Analysis and Verification of WAPI Access Authentication Protocol (WAI)
    Computer Engineering, 2008
    Co-Authors: Pang Liaojun

    Abstract:

    Based on the thoroughly researches and analysis on the WLAN Authentication and Privacy Infrastructure (WAPI) Access Authentication process, i.e. the WAI protocol, this paper analyzes and verifies its Authentication Access process with CK model. Result of analysis indicates that the Authentication Access process of WAI can meet the security requirements of WLAN, such as data privacy protection, integrity protection, mutual identity Authentication, mutual key control, private-key confirmation, etc. Therefore, WAPI can be applied to replace the original security mechanism WEP used in WLAN and to enhance its security.