A Personal Authentication Scheme Using Mobile Technology
نویسندگان
چکیده
Security is a major concern in mobile commerce where information is send over the air. Authentication is possibly the most important property since achieving privacy and integrity may have no sense without the guaranty of the receiver identity. Cryptographic strong authentication protocols are known but the hard problem is to protect secret information, like shared or private keys, used in these protocols. Regarding the problem of smart cards availability (devices and readers) we propose a mobile architecture using more deployed technologies like cellular phones or PDAs and wireless personal area networks (WPAN) like Bluetooth. The mobile device (cellular phones or PDAs) acts as a smart card storing private information and performing cryptographic operations while WPAN replace smart card readers. The risk of insecure wireless networks inclusion is studied and solved using suitable authentication protocols.
منابع مشابه
MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملFast Inter-ap Handoff Using Predictive Authentication Scheme in a Public Wireless Lan
Recently, wireless LAN systems have been widely deployed for public mobile Internet services. Public wireless LAN system can provide high speed Internet connectivity using portable devices such as laptop computers, Personal Digital Assistants (PDA), etc. In the public wireless LAN systems, reliable user authentication and mobility support are essential issues. However, re-authentication during ...
متن کاملEfficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks
Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mobile networks. For personal privacy, it becomes an important is...
متن کاملTrusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment
Technologies make the mobile terminals such as smart phones, PDAs and handsets much more powerful to access mobile network in recent years. Especially with the widely use of mobile terminals, mobile network now becomes a primary tool for daily and business interactions. However, the proliferation of mobile terminals also draws mobile malware’s attention which will do damage to the mobile termin...
متن کاملAn Efficient Password Based Authentication Scheme Using Time Hash Function and Smart Card
User authentication is a most important problem, particularly with mobile devices such as PDA’s, smart card, laptops. User authentication is a primary and foremost problem for every system for providing safe access to access personal information. Password and Personal Identification Number (PIN) based authentication is the leading and classical mechanism for verifying the identity of actual dev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003