Loading…
User authentication scheme preserving anonymity for ubiquitous devices
With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided an...
Saved in:
Published in: | Security and communication networks 2015-11, Vol.8 (17), p.3131-3141 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83 |
---|---|
cites | cdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83 |
container_end_page | 3141 |
container_issue | 17 |
container_start_page | 3131 |
container_title | Security and communication networks |
container_volume | 8 |
creator | Djellali, Benchaa Belarbi, Kheira Chouarfia, Abdallah Lorenz, Pascal |
description | With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley & Sons, Ltd.
Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction. |
doi_str_mv | 10.1002/sec.1238 |
format | article |
fullrecord | <record><control><sourceid>proquest_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_01318397v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1770299159</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</originalsourceid><addsrcrecordid>eNp10N9LwzAQB_AiCv4E_4SCL_pQzSVt0jzKnE4Y_sCJvoU0Xly0a7ekne6_t2MyUfDpwuXDcfeNokMgp0AIPQtoToGyfCPaAclkQoDSzfUb0u1oN4Q3QjikIt2JLh8D-li3zRirxhnduLqKgxnjBOOpx-5z7qrXWFd1tZi4ZhHb2sdt4Wata-o2xC84dwbDfrRldRnw4LvuRaPL_qg3SIa3V9e982FiUkbzxNo0BW65BJ5LbcAIUtjCos4tMSARuKA8ZwUTEouiQJNJwxBJRmgKOmd70clq7FiXaurdRPuFqrVTg_OhWvYIMMiZFHPo7PHKTn09azE0auKCwbLUFXabKxCCUCkhkx09-kPf6tZX3SGdopxnQoj8Z6DxdQge7XoDIGqZveqyV8vsO5qs6IcrcfGvUw_93m_vQoOfa6_9u-KCiUw93Vwpej_g7G74rC7YFwsek5A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1726657778</pqid></control><display><type>article</type><title>User authentication scheme preserving anonymity for ubiquitous devices</title><source>Publicly Available Content Database</source><creator>Djellali, Benchaa ; Belarbi, Kheira ; Chouarfia, Abdallah ; Lorenz, Pascal</creator><creatorcontrib>Djellali, Benchaa ; Belarbi, Kheira ; Chouarfia, Abdallah ; Lorenz, Pascal</creatorcontrib><description>With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley & Sons, Ltd.
Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction.</description><identifier>ISSN: 1939-0114</identifier><identifier>ISSN: 1939-0122</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.1238</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>anonymity ; Authentication ; Channels ; Communication networks ; Computation ; Computer Science ; Mathematical models ; Mobile communication systems ; Networking and Internet Architecture ; Networks ; password ; Privacy ; smart card ; ubiquitous device ; user authentication</subject><ispartof>Security and communication networks, 2015-11, Vol.8 (17), p.3131-3141</ispartof><rights>Copyright © 2015 John Wiley & Sons, Ltd.</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</citedby><cites>FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1726657778?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,881,25731,27901,27902,36989,36990,44566</link.rule.ids><backlink>$$Uhttps://hal.science/hal-01318397$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Djellali, Benchaa</creatorcontrib><creatorcontrib>Belarbi, Kheira</creatorcontrib><creatorcontrib>Chouarfia, Abdallah</creatorcontrib><creatorcontrib>Lorenz, Pascal</creatorcontrib><title>User authentication scheme preserving anonymity for ubiquitous devices</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley & Sons, Ltd.
Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction.</description><subject>anonymity</subject><subject>Authentication</subject><subject>Channels</subject><subject>Communication networks</subject><subject>Computation</subject><subject>Computer Science</subject><subject>Mathematical models</subject><subject>Mobile communication systems</subject><subject>Networking and Internet Architecture</subject><subject>Networks</subject><subject>password</subject><subject>Privacy</subject><subject>smart card</subject><subject>ubiquitous device</subject><subject>user authentication</subject><issn>1939-0114</issn><issn>1939-0122</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp10N9LwzAQB_AiCv4E_4SCL_pQzSVt0jzKnE4Y_sCJvoU0Xly0a7ekne6_t2MyUfDpwuXDcfeNokMgp0AIPQtoToGyfCPaAclkQoDSzfUb0u1oN4Q3QjikIt2JLh8D-li3zRirxhnduLqKgxnjBOOpx-5z7qrXWFd1tZi4ZhHb2sdt4Wata-o2xC84dwbDfrRldRnw4LvuRaPL_qg3SIa3V9e982FiUkbzxNo0BW65BJ5LbcAIUtjCos4tMSARuKA8ZwUTEouiQJNJwxBJRmgKOmd70clq7FiXaurdRPuFqrVTg_OhWvYIMMiZFHPo7PHKTn09azE0auKCwbLUFXabKxCCUCkhkx09-kPf6tZX3SGdopxnQoj8Z6DxdQge7XoDIGqZveqyV8vsO5qs6IcrcfGvUw_93m_vQoOfa6_9u-KCiUw93Vwpej_g7G74rC7YFwsek5A</recordid><startdate>20151125</startdate><enddate>20151125</enddate><creator>Djellali, Benchaa</creator><creator>Belarbi, Kheira</creator><creator>Chouarfia, Abdallah</creator><creator>Lorenz, Pascal</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><general>John Wiley & Sons, Ltd</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>1XC</scope></search><sort><creationdate>20151125</creationdate><title>User authentication scheme preserving anonymity for ubiquitous devices</title><author>Djellali, Benchaa ; Belarbi, Kheira ; Chouarfia, Abdallah ; Lorenz, Pascal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>anonymity</topic><topic>Authentication</topic><topic>Channels</topic><topic>Communication networks</topic><topic>Computation</topic><topic>Computer Science</topic><topic>Mathematical models</topic><topic>Mobile communication systems</topic><topic>Networking and Internet Architecture</topic><topic>Networks</topic><topic>password</topic><topic>Privacy</topic><topic>smart card</topic><topic>ubiquitous device</topic><topic>user authentication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Djellali, Benchaa</creatorcontrib><creatorcontrib>Belarbi, Kheira</creatorcontrib><creatorcontrib>Chouarfia, Abdallah</creatorcontrib><creatorcontrib>Lorenz, Pascal</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Djellali, Benchaa</au><au>Belarbi, Kheira</au><au>Chouarfia, Abdallah</au><au>Lorenz, Pascal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>User authentication scheme preserving anonymity for ubiquitous devices</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2015-11-25</date><risdate>2015</risdate><volume>8</volume><issue>17</issue><spage>3131</spage><epage>3141</epage><pages>3131-3141</pages><issn>1939-0114</issn><issn>1939-0122</issn><eissn>1939-0122</eissn><abstract>With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card‐based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card‐based authentication scheme that aims to provide more functionality to resist well‐known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed. Copyright © 2015 John Wiley & Sons, Ltd.
Pervasive computing environment includes a variety of network protocols and is expected to support many service models. To allow only legitimate users, securisation of interaction between mobile users and service providers must be performed. But, over an insecure communication channel, it is difficult to definitely decide which infrastructure and which mechanism of authentication are suitable for pervasive network. Based on a stochastic process with Markov property, the proposed scheme aims to provide both user anonymity and mutual authentication, and to achieve user privacy with security and functionality requirements satisfaction.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.1238</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2015-11, Vol.8 (17), p.3131-3141 |
issn | 1939-0114 1939-0122 1939-0122 |
language | eng |
recordid | cdi_hal_primary_oai_HAL_hal_01318397v1 |
source | Publicly Available Content Database |
subjects | anonymity Authentication Channels Communication networks Computation Computer Science Mathematical models Mobile communication systems Networking and Internet Architecture Networks password Privacy smart card ubiquitous device user authentication |
title | User authentication scheme preserving anonymity for ubiquitous devices |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A04%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=User%20authentication%20scheme%20preserving%20anonymity%20for%20ubiquitous%20devices&rft.jtitle=Security%20and%20communication%20networks&rft.au=Djellali,%20Benchaa&rft.date=2015-11-25&rft.volume=8&rft.issue=17&rft.spage=3131&rft.epage=3141&rft.pages=3131-3141&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.1238&rft_dat=%3Cproquest_hal_p%3E1770299159%3C/proquest_hal_p%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c4328-ff4416f691689ac1c70bfbfea8f0c19e1672683b379ebbbec59c3ee050241a83%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1726657778&rft_id=info:pmid/&rfr_iscdi=true |