Loading...
Please wait, while we are loading the content...
Similar Documents
Session key authentication mechanisms for wireless sensor network users.
| Content Provider | CiteSeerX |
|---|---|
| Author | Savitha S., V. Jisha, K. |
| Abstract | Abstract- Seamless roaming over wireless network is highly desirable to mobile users, and security such as authentication of mobile users is challenging. Recently, due to tamper-resistance and convenience in managing a password file, some smart card based secure authentication schemes have been proposed. This paper shows some security weaknesses in those schemes. As the main contribution of this paper, a secure and light-weight authentication scheme with user anonymity is presented. It is simple to implement for mobile user since it only performs a symmetric encryption/decryption operation. Having this feature, it is more suitable for the low-power and resource-limited mobile devices. In addition, it requires four message exchanges between mobile user, foreign agent and home agent. Thus, this protocol enjoys both computation and communication efficiency as compared to the well-known authentication schemes. As a special case, we consider the authentication protocol when a user is located in his/her home network. In this paper, we propose a privacy-preserving universal authentication protocol, called Priauth, which provides strong user anonymity against both eavesdroppers and foreign servers, session key establishment, and achieves efficiency. Most importantly, Priauth provides an efficient approach to tackle the problem of user revocation while supporting strong user untraceability. I. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Mobile User Session Key Authentication Mechanism Wireless Sensor Network User User Revocation Security Weakness Privacy-preserving Universal Authentication Protocol Home Network Password File Special Case Strong User Untraceability User Anonymity Foreign Server Home Agent Wireless Network Main Contribution Authentication Protocol Message Exchange Well-known Authentication Scheme Abstract Seamless Foreign Agent Session Key Establishment Secure Authentication Scheme Efficient Approach Strong User Anonymity Light-weight Authentication Scheme Communication Efficiency Symmetric Encryption Decryption Operation Resource-limited Mobile Device |
| Content Type | Text |
| Resource Type | Article |