efficient authentication for mobile and pervasive computing, ,

1
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014 SLVIS Networking, #40/7 (b), 2 nd floor, Sri Sai Complex, M.S.R.E.C Main Road, MSR Nagar, Mathikere, Bangalore-560054, Mob: 9900707000 / 7795707000 Ph:080-65707000 www.slvisnetworking.com Efficient Authentication for Mobile And Pervasive Computing AbstractWith todays technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.

Upload: pradeep-reddy

Post on 21-Jun-2015

38 views

Category:

Education


3 download

DESCRIPTION

ieee projects in bangalore, ieee 2014 project on Mobile Computing, ieee projects for cse, ieee final year projects, IEEE 2014 project on Mobile Computing, www.slvisnetworking.com

TRANSCRIPT

Page 1: Efficient authentication for mobile and pervasive computing, ,

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014

SLVIS Networking, #40/7 (b), 2nd floor, Sri Sai Complex, M.S.R.E.C Main Road, MSR Nagar, Mathikere, Bangalore-560054, Mob: 9900707000 / 7795707000 Ph:080-65707000 www.slvisnetworking.com

Efficient Authentication for Mobile And Pervasive Computing

Abstract—

With today’s technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.