Loading…

User authentication scheme preserving anonymity for ubiquitous devices

With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided an...

Full description

Saved in:
Bibliographic Details
Published in:Security and communication networks 2015-11, Vol.8 (17), p.3131-3141
Main Authors: Djellali, Benchaa, Belarbi, Kheira, Chouarfia, Abdallah, Lorenz, Pascal
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83
cites cdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83
container_end_page 3141
container_issue 17
container_start_page 3131
container_title Security and communication networks
container_volume 8
creator Djellali, Benchaa
Belarbi, Kheira
Chouarfia, Abdallah
Lorenz, Pascal
description With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley & Sons, Ltd. Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction.
doi_str_mv 10.1002/sec.1238
format article
fullrecord <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01318397v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1770299159</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</originalsourceid><addsrcrecordid>eNp10N9LwzAQB_AiCv4E_4SCL_pQzSVt0jzKnE4Y_sCJvoU0Xly0a7ekne6_t2MyUfDpwuXDcfeNokMgp0AIPQtoToGyfCPaAclkQoDSzfUb0u1oN4Q3QjikIt2JLh8D-li3zRirxhnduLqKgxnjBOOpx-5z7qrXWFd1tZi4ZhHb2sdt4Wata-o2xC84dwbDfrRldRnw4LvuRaPL_qg3SIa3V9e982FiUkbzxNo0BW65BJ5LbcAIUtjCos4tMSARuKA8ZwUTEouiQJNJwxBJRmgKOmd70clq7FiXaurdRPuFqrVTg_OhWvYIMMiZFHPo7PHKTn09azE0auKCwbLUFXabKxCCUCkhkx09-kPf6tZX3SGdopxnQoj8Z6DxdQge7XoDIGqZveqyV8vsO5qs6IcrcfGvUw_93m_vQoOfa6_9u-KCiUw93Vwpej_g7G74rC7YFwsek5A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1726657778</pqid></control><display><type>article</type><title>User authentication scheme preserving anonymity for ubiquitous devices</title><source>Publicly Available Content Database</source><creator>Djellali, Benchaa ; Belarbi, Kheira ; Chouarfia, Abdallah ; Lorenz, Pascal</creator><creatorcontrib>Djellali, Benchaa ; Belarbi, Kheira ; Chouarfia, Abdallah ; Lorenz, Pascal</creatorcontrib><description>With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley &amp; Sons, Ltd. Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction.</description><identifier>ISSN: 1939-0114</identifier><identifier>ISSN: 1939-0122</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1238</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>anonymity ; Authentication ; Channels ; Communication networks ; Computation ; Computer Science ; Mathematical models ; Mobile communication systems ; Networking and Internet Architecture ; Networks ; password ; Privacy ; smart card ; ubiquitous device ; user authentication</subject><ispartof>Security and communication networks, 2015-11, Vol.8 (17), p.3131-3141</ispartof><rights>Copyright © 2015 John Wiley &amp; Sons, Ltd.</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</citedby><cites>FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1726657778?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,881,25731,27901,27902,36989,36990,44566</link.rule.ids><backlink>$$Uhttps://hal.science/hal-01318397$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Djellali, Benchaa</creatorcontrib><creatorcontrib>Belarbi, Kheira</creatorcontrib><creatorcontrib>Chouarfia, Abdallah</creatorcontrib><creatorcontrib>Lorenz, Pascal</creatorcontrib><title>User authentication scheme preserving anonymity for ubiquitous devices</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley &amp; Sons, Ltd. Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction.</description><subject>anonymity</subject><subject>Authentication</subject><subject>Channels</subject><subject>Communication networks</subject><subject>Computation</subject><subject>Computer Science</subject><subject>Mathematical models</subject><subject>Mobile communication systems</subject><subject>Networking and Internet Architecture</subject><subject>Networks</subject><subject>password</subject><subject>Privacy</subject><subject>smart card</subject><subject>ubiquitous device</subject><subject>user authentication</subject><issn>1939-0114</issn><issn>1939-0122</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp10N9LwzAQB_AiCv4E_4SCL_pQzSVt0jzKnE4Y_sCJvoU0Xly0a7ekne6_t2MyUfDpwuXDcfeNokMgp0AIPQtoToGyfCPaAclkQoDSzfUb0u1oN4Q3QjikIt2JLh8D-li3zRirxhnduLqKgxnjBOOpx-5z7qrXWFd1tZi4ZhHb2sdt4Wata-o2xC84dwbDfrRldRnw4LvuRaPL_qg3SIa3V9e982FiUkbzxNo0BW65BJ5LbcAIUtjCos4tMSARuKA8ZwUTEouiQJNJwxBJRmgKOmd70clq7FiXaurdRPuFqrVTg_OhWvYIMMiZFHPo7PHKTn09azE0auKCwbLUFXabKxCCUCkhkx09-kPf6tZX3SGdopxnQoj8Z6DxdQge7XoDIGqZveqyV8vsO5qs6IcrcfGvUw_93m_vQoOfa6_9u-KCiUw93Vwpej_g7G74rC7YFwsek5A</recordid><startdate>20151125</startdate><enddate>20151125</enddate><creator>Djellali, Benchaa</creator><creator>Belarbi, Kheira</creator><creator>Chouarfia, Abdallah</creator><creator>Lorenz, Pascal</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><general>John Wiley &amp; Sons, Ltd</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>1XC</scope></search><sort><creationdate>20151125</creationdate><title>User authentication scheme preserving anonymity for ubiquitous devices</title><author>Djellali, Benchaa ; Belarbi, Kheira ; Chouarfia, Abdallah ; Lorenz, Pascal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>anonymity</topic><topic>Authentication</topic><topic>Channels</topic><topic>Communication networks</topic><topic>Computation</topic><topic>Computer Science</topic><topic>Mathematical models</topic><topic>Mobile communication systems</topic><topic>Networking and Internet Architecture</topic><topic>Networks</topic><topic>password</topic><topic>Privacy</topic><topic>smart card</topic><topic>ubiquitous device</topic><topic>user authentication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Djellali, Benchaa</creatorcontrib><creatorcontrib>Belarbi, Kheira</creatorcontrib><creatorcontrib>Chouarfia, Abdallah</creatorcontrib><creatorcontrib>Lorenz, Pascal</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Djellali, Benchaa</au><au>Belarbi, Kheira</au><au>Chouarfia, Abdallah</au><au>Lorenz, Pascal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>User authentication scheme preserving anonymity for ubiquitous devices</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2015-11-25</date><risdate>2015</risdate><volume>8</volume><issue>17</issue><spage>3131</spage><epage>3141</epage><pages>3131-3141</pages><issn>1939-0114</issn><issn>1939-0122</issn><eissn>1939-0122</eissn><abstract>With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley &amp; Sons, Ltd. Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.1238</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2015-11, Vol.8 (17), p.3131-3141
issn 1939-0114
1939-0122
1939-0122
language eng
recordid cdi_hal_primary_oai_HAL_hal_01318397v1
source Publicly Available Content Database
subjects anonymity
Authentication
Channels
Communication networks
Computation
Computer Science
Mathematical models
Mobile communication systems
Networking and Internet Architecture
Networks
password
Privacy
smart card
ubiquitous device
user authentication
title User authentication scheme preserving anonymity for ubiquitous devices
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A04%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=User%20authentication%20scheme%20preserving%20anonymity%20for%20ubiquitous%20devices&rft.jtitle=Security%20and%20communication%20networks&rft.au=Djellali,%20Benchaa&rft.date=2015-11-25&rft.volume=8&rft.issue=17&rft.spage=3131&rft.epage=3141&rft.pages=3131-3141&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1238&rft_dat=%3Cproquest_hal_p%3E1770299159%3C/proquest_hal_p%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1726657778&rft_id=info:pmid/&rfr_iscdi=true