Authentication and Privacy

نویسندگان

  • Thomas M. Chen
  • Nhut Nguyen
چکیده

Authentication and privacy refer to the problems of ensuring that communication takes place only between the right parties without disclosure of information to unauthorized eavesdroppers. Radio communication is highly appealing for the convenience of mobility—the freedom from a fixed location. For this reason, wireless services have been growing rapidly. In 2005, an ITU study found more than 2 billion cellular phone subscribers and more than 1.26 billion land phone lines in the world. It has become easy to find IEEE 802.11 wireless LANs in residences, hotels, stores, and corporate sites. Smart phones and a variety of wireless messaging devices can send SMS, e-mail, and browse theWorldWide Web through a number of wireless services. IEEE 802.16 ‘‘WiMax’’ is starting to offer broadband wireless services in the local loop. The enthusiasm for wireless services makes it easy to ignore the inherent insecurity of the radio medium. The most obvious risk is that radio signals can be received by anyone within range of the transmitter. Radio communications are easy to intercept, possibly by someone who is beyond sight. In contrast, it is more difficult to intercept wired communications. An eavesdropper must physically access a wired medium and therefore tends to be more visible. In wireless communications, the loss of privacy (or confidentiality) is always a possibility, which motivates the need to devise measures to protect privacy. The primary means used to protect privacy in wireless systems is cryptography, which is described in this chapter. Another clear risk is impersonation where someone presents a false identity to attempt to access unauthorized services. For land line phones, impersonation is a much smaller risk because phones are typically in an indoor environment under private ownership. It is implicitly assumed that the owner is responsible for physical access. The identity of a land line phone user is associated with that fixed location. However, users in a wireless network are mobile, so their identities cannot be associated with a particular location. Instead, mobile users must carry their credentials (e.g., passwords) and present them to the network to verify their identity. It is important that authentication credentials are difficult to duplicate by someone else. Authentication of mobile user identities, also largely based on cryptography, is another topic covered in this chapter.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008