使用无线公钥基础设施增强移动商务端到端安全性的身份验证和密钥交换

IF 2.1 Q2 INFORMATION SCIENCE & LIBRARY SCIENCE Information Discovery and Delivery Pub Date : 2019-09-20 DOI:10.1108/idd-02-2019-0012
K. Prakasha, Balachandra Muniyal, Vasundhara Acharya
{"title":"使用无线公钥基础设施增强移动商务端到端安全性的身份验证和密钥交换","authors":"K. Prakasha, Balachandra Muniyal, Vasundhara Acharya","doi":"10.1108/idd-02-2019-0012","DOIUrl":null,"url":null,"abstract":"\nPurpose\nThe purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism.\n\n\nDesign/methodology/approach\nOne of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm.\n\n\nFindings\nThe time consumed for the proposed research work shows that it is practical and acceptable.\n\n\nOriginality/value\nThe proposed research work is an efficient and enhanced user authentication mechanism.\n","PeriodicalId":43488,"journal":{"name":"Information Discovery and Delivery","volume":" ","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/idd-02-2019-0012","citationCount":"2","resultStr":"{\"title\":\"Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure\",\"authors\":\"K. Prakasha, Balachandra Muniyal, Vasundhara Acharya\",\"doi\":\"10.1108/idd-02-2019-0012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\nPurpose\\nThe purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism.\\n\\n\\nDesign/methodology/approach\\nOne of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm.\\n\\n\\nFindings\\nThe time consumed for the proposed research work shows that it is practical and acceptable.\\n\\n\\nOriginality/value\\nThe proposed research work is an efficient and enhanced user authentication mechanism.\\n\",\"PeriodicalId\":43488,\"journal\":{\"name\":\"Information Discovery and Delivery\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":2.1000,\"publicationDate\":\"2019-09-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1108/idd-02-2019-0012\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Discovery and Delivery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/idd-02-2019-0012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"INFORMATION SCIENCE & LIBRARY SCIENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Discovery and Delivery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/idd-02-2019-0012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"INFORMATION SCIENCE & LIBRARY SCIENCE","Score":null,"Total":0}
引用次数: 2

摘要

目的本研究的目的是开发一种安全、高效和增强的用户身份验证机制,以实现可靠和经过身份验证的连接。在网上交易中,用户和资源位于不同的地方,敏感信息将使用适当、可靠的机制得到保护和转移。设计/方法/方法处理需求的最新方法之一是通过公钥基础设施(PKI)或其变体无线公钥基础设施。基础管理技术是公钥密码系统的攻击点之一,因此要求它们非常安全和重要。实体认证和密钥协商(AKA)是无线通信中的一个关键密码问题,相互实体认证在建立安全可靠的连接方面起着至关重要的作用。本文提出了一种具有端到端安全性的高效增强型AKA方案(EAKA),并使用互联网安全协议和应用程序的自动验证来验证所提出的保护系统。提出了一种使用基于格的密码算法来实现该协议的增强版本的有效方法。发现所提出的研究工作所花费的时间表明它是实用的和可接受的。独创性/价值所提出的研究工作是一种高效且增强的用户身份验证机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure
Purpose The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value The proposed research work is an efficient and enhanced user authentication mechanism.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Information Discovery and Delivery
Information Discovery and Delivery INFORMATION SCIENCE & LIBRARY SCIENCE-
CiteScore
5.40
自引率
4.80%
发文量
21
期刊介绍: Information Discovery and Delivery covers information discovery and access for digital information researchers. This includes educators, knowledge professionals in education and cultural organisations, knowledge managers in media, health care and government, as well as librarians. The journal publishes research and practice which explores the digital information supply chain ie transport, flows, tracking, exchange and sharing, including within and between libraries. It is also interested in digital information capture, packaging and storage by ‘collectors’ of all kinds. Information is widely defined, including but not limited to: Records, Documents, Learning objects, Visual and sound files, Data and metadata and , User-generated content.
期刊最新文献
Visualizing the evolution of touchscreen research by scientometric analysis Analyzing user sentiments toward selected content management software: a sentiment analysis of viewer’s comments on YouTube Usability testing of a website through different devices: a task-based approach in a public university setting in Bangladesh Exploring Information Systems (IS) curricula: a semantic analysis approach Examines the value of cloud computing adoption as a proxy for IT flexibility and effectiveness
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1