نتایج جستجو برای: mutual authentication
تعداد نتایج: 76549 فیلتر نتایج به سال:
Traditional solutions handle security at the application layer, which causes huge signaling overhead and long delay if authentication is implemented for every signal to enhance the security of wireless communication systems. In this paper, a realtime and two-way authentication method is proposed, which is based on the characteristics of radio channel including randomness and privacy. For the pr...
From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using image encryption that resists all the possible attacks and satisfies the needs of a user. Its securi...
During the last few years, it has become more and more conpeling in mobile applications, mobile IPv6 technology is convenient, but also produces a series of security compromise. Identify authentication is an important part of the network security. In this paper, we proposed a secure identify authentication scheme combining reputation mechanism, which considers inters domain trust relationship b...
This work addresses the issues related to authentication in wireless LAN environments, with emphasis on the IEEE 802.11 standard. It proposes an authentication architecture for Wireless networks. This architecture called Wireless Kerberos (W-Kerberos), is based on the Kerberos authentication server and the IEEE 802.1X-EAP model, in order to satisfy both security and mobility needs. It then, pro...
Wireless Sensor Networks (WSNs) are operated in hostile unattended environment so authentication is one of the important security requirements. Because of the resource constrained characteristics of WSN, the authentication scheme should sustain a lesser amount of computational as well as communication overhead. Some schemes proposed in literature are vulnerable to node compromised attack. Some ...
The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the focus of this paper. In such a biometrics-based cardholder authentication system, sensitive data will typically need to be transferred between the smartcard and the card reader. We propose strategies to ensure integrity of the se...
Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.’s protocol is not secure to randoml...
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server...
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 certificate followed by the authentication of the user either with own password or with some cookie stored within the user’s browser. Unfortunately, this solution is susceptible to various impersonation attacks such as ...
Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied twofactor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been prop...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید