نتایج جستجو برای: mutual authentication

تعداد نتایج: 76549  

Journal: :JCM 2011
Xiangyu Lu Yuyan Zhang Yuexing Peng Hui Zhao Wenbo Wang

Traditional solutions handle security at the application layer, which causes huge signaling overhead and long delay if authentication is implemented for every signal to enhance the security of wireless communication systems. In this paper, a realtime and two-way authentication method is proposed, which is based on the characteristics of radio channel including randomness and privacy. For the pr...

2013
Ravi Singh Pippal Pradeep Gupta Rakesh Singh

From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using image encryption that resists all the possible attacks and satisfies the needs of a user. Its securi...

Journal: :JNW 2009
Zhi Zhang Guohua Cui

During the last few years, it has become more and more conpeling in mobile applications, mobile IPv6 technology is convenient, but also produces a series of security compromise. Identify authentication is an important part of the network security. In this paper, we proposed a secure identify authentication scheme combining reputation mechanism, which considers inters domain trust relationship b...

2004
Mohamed Ali Kâafar Lamia Ben Azzouz Farouk Kamoun Davor Males

This work addresses the issues related to authentication in wireless LAN environments, with emphasis on the IEEE 802.11 standard. It proposes an authentication architecture for Wireless networks. This architecture called Wireless Kerberos (W-Kerberos), is based on the Kerberos authentication server and the IEEE 802.1X-EAP model, in order to satisfy both security and mobility needs. It then, pro...

2011
Vivek Patel Sankita Patel Devesh Jinwala

Wireless Sensor Networks (WSNs) are operated in hostile unattended environment so authentication is one of the important security requirements. Because of the resource constrained characteristics of WSN, the authentication scheme should sustain a lesser amount of computational as well as communication overhead. Some schemes proposed in literature are vulnerable to node compromised attack. Some ...

2003
Luciano Rila Chris J. Mitchell

The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the focus of this paper. In such a biometrics-based cardholder authentication system, sensitive data will typically need to be transferred between the smartcard and the card reader. We propose strategies to ensure integrity of the se...

2009
Seungjoo Kim

Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.’s protocol is not secure to randoml...

Journal: :Security and Communication Networks 2008
Huei-Ru Tseng Rong-Hong Jan Wuu Yang

Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can freely choose and change his passwords; (2) our scheme provides mutual authentication between a server...

2008
Sebastian Gajek Mark Manulis Jörg Schwenk

The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 certificate followed by the authentication of the user either with own password or with some cookie stored within the user’s browser. Unfortunately, this solution is susceptible to various impersonation attacks such as ...

2017
Younsung Choi

Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied twofactor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been prop...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید