An inter-domain authentication scheme for pervasive computing environment

被引:16
作者
Yao, Lin [1 ,2 ]
Wang, Lei [2 ]
Kong, Xiangwei [1 ]
Wu, Guowei [2 ]
Xia, Feng [2 ]
机构
[1] Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116023, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116023, Peoples R China
关键词
Inter-domain authentication; Key establishment; Biometric Encryption; Signcryption; Pervasive computing; PROTOCOL;
D O I
10.1016/j.camwa.2010.01.010
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a pervasive computing environment, mobile users often roam into foreign domains. Consequently, mutual authentication between the user and the service provider in different domains becomes a critical issue. In this paper, a fast and secure inter-domain authentication and key establishment scheme, namely IDAS, is proposed. IDAS adopts Biometrics to guarantee the uniqueness and privacy of users and adopts signcryption to generate a secure session key. IDAS can not only reduce the burden of certificates management, but also protect the users and authentication servers against fraud. Compared with some other authentication methods, our approach is superior with faster key exchange and authentication, as well as more privacy. The correctness is verified with the Syverson and Van Oorschot (SVO) logic. Crown Copyright (C) 2010 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:234 / 244
页数:11
相关论文
共 13 条
[1]   Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection [J].
Belhumeur, PN ;
Hespanha, JP ;
Kriegman, DJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) :711-720
[2]   A privacy preserving access control scheme using anonymous identification for ubiquitous environments [J].
Diep, Nguyen Ngoc ;
Lee, Sungyoung ;
Lee, Young-Koo ;
Lee, Heejo .
13TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, :482-+
[3]  
FERSCHA A, 2003, DATENBANK SPEKTRUM, V7, P48
[4]   A new efficient authentication protocol for mobile networks [J].
Hwang, RJ ;
Su, FF .
COMPUTER STANDARDS & INTERFACES, 2005, 28 (02) :241-252
[5]  
Jain R, 2008, INT J DIABETES DEV C, V28, P1, DOI 10.4103/0973-3930.41978
[6]   Biohashing: two factor authentication featuring fingerprint data and tokenised random number [J].
Jin, ATB ;
Ling, DNC ;
Goh, A .
PATTERN RECOGNITION, 2004, 37 (11) :2245-2255
[7]   Formal methods for cryptographic protocol analysis: Emerging issues and trends [J].
Meadows, C .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (01) :44-54
[8]  
Nichols R.K., 1998, ICSA GUIDE CRYPTOGRA
[9]  
SYVERSON PF, 1994, 1994 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY, PROCEEDINGS, P14
[10]  
Tuladhar Summit R., 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08), P249, DOI 10.1109/SUTC.2008.61