M. Bilal, и S. Kang. International Journal of Communication Systems, 30 (5):
e3309(2017)cite arxiv:1702.04055Comment: This article is accepted for the publication in "International Journal of Communication Systems".
DOI: 10.1002/dac.3309
Аннотация
Authentication is the first step toward establishing a service provider and
customer (C-P) association. In a mobile network environment, a lightweight and
secure authentication protocol is one of the most significant factors to
enhance the degree of service persistence. This work presents a secure and
lightweight keying and authentication protocol suite termed TAP (Time-Assisted
Authentication Protocol). TAP improves the security of protocols with the
assistance of time-based encryption keys and scales down the authentication
complexity by issuing a re-authentication ticket. While moving across the
network, a mobile customer node sends a re-authentication ticket to establish
new sessions with service-providing nodes. Consequently, this reduces the
communication and computational complexity of the authentication process. In
the keying protocol suite, a key distributor controls the key generation
arguments and time factors, while other participants independently generate a
keychain based on key generation arguments. We undertake a rigorous security
analysis and prove the security strength of TAP using CSP and rank function
analysis.
%0 Journal Article
%1 bilal2017timeassisted
%A Bilal, Muhammad
%A Kang, Shin-Gak
%D 2017
%J International Journal of Communication Systems
%K CSP authentication distribution functions key network rank security
%N 5
%P e3309
%R 10.1002/dac.3309
%T Time-Assisted Authentication Protocol
%U http://arxiv.org/abs/1702.04055
%V 30
%X Authentication is the first step toward establishing a service provider and
customer (C-P) association. In a mobile network environment, a lightweight and
secure authentication protocol is one of the most significant factors to
enhance the degree of service persistence. This work presents a secure and
lightweight keying and authentication protocol suite termed TAP (Time-Assisted
Authentication Protocol). TAP improves the security of protocols with the
assistance of time-based encryption keys and scales down the authentication
complexity by issuing a re-authentication ticket. While moving across the
network, a mobile customer node sends a re-authentication ticket to establish
new sessions with service-providing nodes. Consequently, this reduces the
communication and computational complexity of the authentication process. In
the keying protocol suite, a key distributor controls the key generation
arguments and time factors, while other participants independently generate a
keychain based on key generation arguments. We undertake a rigorous security
analysis and prove the security strength of TAP using CSP and rank function
analysis.
@article{bilal2017timeassisted,
abstract = {Authentication is the first step toward establishing a service provider and
customer (C-P) association. In a mobile network environment, a lightweight and
secure authentication protocol is one of the most significant factors to
enhance the degree of service persistence. This work presents a secure and
lightweight keying and authentication protocol suite termed TAP (Time-Assisted
Authentication Protocol). TAP improves the security of protocols with the
assistance of time-based encryption keys and scales down the authentication
complexity by issuing a re-authentication ticket. While moving across the
network, a mobile customer node sends a re-authentication ticket to establish
new sessions with service-providing nodes. Consequently, this reduces the
communication and computational complexity of the authentication process. In
the keying protocol suite, a key distributor controls the key generation
arguments and time factors, while other participants independently generate a
keychain based on key generation arguments. We undertake a rigorous security
analysis and prove the security strength of TAP using CSP and rank function
analysis.},
added-at = {2018-09-18T07:13:02.000+0200},
author = {Bilal, Muhammad and Kang, Shin-Gak},
biburl = {https://www.bibsonomy.org/bibtex/22caa1e11bf9f6f59d30414321e44b75f/mbilal084},
description = {Time-Assisted Authentication Protocol},
doi = {10.1002/dac.3309},
interhash = {f458e36b3d3545407f984629bb32e20c},
intrahash = {2caa1e11bf9f6f59d30414321e44b75f},
journal = {International Journal of Communication Systems},
keywords = {CSP authentication distribution functions key network rank security},
note = {cite arxiv:1702.04055Comment: This article is accepted for the publication in "International Journal of Communication Systems"},
number = 5,
pages = {e3309},
timestamp = {2018-09-18T07:14:04.000+0200},
title = {Time-Assisted Authentication Protocol},
url = {http://arxiv.org/abs/1702.04055},
volume = 30,
year = 2017
}