Authentication Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 32319 Experts worldwide ranked by ideXlab platform

Liu Ya-l - One of the best experts on this subject based on the ideXlab platform.

  • Ultralightweight RFID Mutual-Authentication Protocol
    Computer Science, 2013
    Co-Authors: Liu Ya-l
    Abstract:

    Due to the open wireless communication environments in radio frequency identification(RFID)systems,particularly the reader-tag air interface,security and privacy are increasingly becoming noteworthy issues.It is imperative to design ultralightweight RFID Authentication Protocols to resist various malicious attacks and threats.A new ultralightweight RFID mutual-Authentication Protocol for low-cost was proposed,which avoids the security omission in the previous RFID Authentication Protocols.Security analysis shows that the Protocol possesses robust security and privacy properties as well as defending against the possible malicious attacks.In terms of the resource-constrained requirements of low-cost RFID tags,the Protocol requires only two simple bitwise operations over the tag end and meanwhile it has better performance advantages compared with other ultralightweight RFID Authentication Protocols.

Li Jianhua - One of the best experts on this subject based on the ideXlab platform.

  • RFID Secure Authentication Protocol Based on Stream Cipher
    Computer Engineering, 2012
    Co-Authors: Gong Jie-zhong, Chen Gongliang, Li Linsen, Li Jianhua
    Abstract:

    Aiming at the security problem of Radio Frequency Identification(RFID) Authentication Protocol,this paper designs a secure RFID Authentication Protocol based on stream cipher,inspired from the challenge-response-based RFID Authentication Protocol for distributed database environment.Theory analysis proves that the proposed Protocol can prevent several attacks including spoofing attack,replay attack,tracking and desynchronization.And it improves the efficiency of searching on the back-up database which makes the Protocol more applicable.

Xingming Sun - One of the best experts on this subject based on the ideXlab platform.

  • A lightweight multi-layer Authentication Protocol for wireless body area networks
    Future Generation Computer Systems, 2018
    Co-Authors: Jian Shen, Jun Shen, Shaohua Chang, Qi Liu, Xingming Sun
    Abstract:

    Nowadays, the technology of Internet of Things (IoT) is getting more and more important which brings a lot of convenience to people's life and city's development. As a key application of IoT, wireless body area networks (WBANs) provides people high quality of life and high level of medical service. However, due to the sensitiveness of medical system, security and privacy issues in WBANs are very important. In previous research, there are no comprehensive Authentication Protocols designed for WBANs according to its characteristics of network structure. In this paper, we propose an efficient multilayer Authentication Protocol and a secure session key generation method for WBANs. Firstly, we design a one-to-many group Authentication Protocol and a group key establishment algorithm between personal digital assistance (PDA) and each of sensor nodes with energy efficiency and low computational cost. Then, we present a new certificateless Authentication Protocol with no pairings based on certificateless cryptography between PDA and application provider (AP), using ECC algorithm that provides low computational cost with high security. In addition, the validation of the proposed Protocol can be proved. Finally, the security and performance analysis shows that our Protocol is secure and efficient.

Gavin Lowe - One of the best experts on this subject based on the ideXlab platform.

  • Analysing a stream Authentication Protocol using model checking
    International Journal of Information Security, 2004
    Co-Authors: Philippa Hopcroft, Gavin Lowe
    Abstract:

    In this paper, we consider how one can analyse a stream Authentication Protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient Stream Loss-tolerant Authentication Protocol, TESLA. This Protocol differs from the standard class of Authentication Protocols previously analysed using model checking techniques in the following interesting way: an unbounded stream of messages is broadcast by a sender, making use of an unbounded stream of keys; the Authentication of the n-th message in the stream is achieved on receipt of the n+1-th message. We show that, despite the infinite nature of the Protocol, it is possible to build a finite model that correctly captures its behaviour.

  • an attack on the needham schroeder public key Authentication Protocol
    Information Processing Letters, 1995
    Co-Authors: Gavin Lowe
    Abstract:

    In this paper we present an attack upon the Needham-Schroeder public-key Authentication Protocol. The attack allows an intruder to impersonate another agent.

Jian Shen - One of the best experts on this subject based on the ideXlab platform.

  • A lightweight multi-layer Authentication Protocol for wireless body area networks
    Future Generation Computer Systems, 2018
    Co-Authors: Jian Shen, Jun Shen, Shaohua Chang, Qi Liu, Xingming Sun
    Abstract:

    Nowadays, the technology of Internet of Things (IoT) is getting more and more important which brings a lot of convenience to people's life and city's development. As a key application of IoT, wireless body area networks (WBANs) provides people high quality of life and high level of medical service. However, due to the sensitiveness of medical system, security and privacy issues in WBANs are very important. In previous research, there are no comprehensive Authentication Protocols designed for WBANs according to its characteristics of network structure. In this paper, we propose an efficient multilayer Authentication Protocol and a secure session key generation method for WBANs. Firstly, we design a one-to-many group Authentication Protocol and a group key establishment algorithm between personal digital assistance (PDA) and each of sensor nodes with energy efficiency and low computational cost. Then, we present a new certificateless Authentication Protocol with no pairings based on certificateless cryptography between PDA and application provider (AP), using ECC algorithm that provides low computational cost with high security. In addition, the validation of the proposed Protocol can be proved. Finally, the security and performance analysis shows that our Protocol is secure and efficient.

  • efficient end to end Authentication Protocol for wearable health monitoring systems
    Computers & Electrical Engineering, 2017
    Co-Authors: Qi Jiang, Jian Shen, Chao Yang, Shehzad Ashraf Chaudhry
    Abstract:

    Abstract Wearable health monitoring systems (WHMSs) will play an increasingly important role in future e-healthcare and enable smart and ubiquitous healthcare services. Given its sensitivity, the health data should be protected against unauthorized access. As a result, it is critical to design an end-to-end mutual Authentication Protocol that enables secure communication between the wearable sensor and medical professionals. Recently, Amin et al. proposed an anonymity preserving mutual Authentication Protocol for WHMSs. However, we identify that their Protocol suffers from stolen mobile device attack, desynchronization attack, and sensor key exposure. Then we put forward an improved end-to-end Authentication Protocol based on quadratic residues. Comprehensive security analysis is conducted to show that the proposed Protocol fixes these flaws of Amin et al.’s Protocol and satisfies all desired requirements. The comparison with these existing Protocols demonstrates that our Protocol provides a practical end-to-end security solution for WHMSs.

  • ICGEC - Certificateless Authentication Protocol for Wireless Body Area Network
    Advances in Intelligent Systems and Computing, 2016
    Co-Authors: Jian Shen, Shaohua Chang
    Abstract:

    In order to address the problems of security communication and vital physiological data for WBANs, in this paper, we propose an effective Authentication Protocol and secure session key generation method. Based on certificateless cryptography, we present a new certificateless encryption scheme and a new certificateless signature scheme, both of that is provably secure and efficiency. Then, taking the above two scheme as a basis, we propose a novel certificateless Authentication Protocol which is anonymous and mutual Authentication. After successful authenticating, an efficient and secure session key is generated at last for subsequent communication in our Protocol.