Privacy Preserving for Efficient Authentication in Pervasive

نویسنده

  • M .Srilatha
چکیده

In the present computer era and advancement in mobile communication system where many applications rely on the existence of small devices and small applications which exchange data in any communication networks challenging is to provide security where the significant portion of applications is based on the confidentiality and integrity of messages that are communicated by short encrypted messages that are based on advance encryption cryptographic directed to meet the requirements of mobile pervasive applications by authenticating the message accuracy to secure the communication the proposed message authentication technique. In this paper we implement the MAC algorithm and the aim to utilize the security based on the encryption algorithm provide to design more efficient authentication mechanisms using the standalone authentication primitives with sender input data where the transmitter and receiver will exchange the data by evaluating the real time scenario Keywords—Authentication, pervasive computing, Mobile Computing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments

The exchange of user-related sensitive data within a Pervasive Computing Environment (PCE) raises security and privacy concerns. On one hand, service providers require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, i.e., untraceability and unlinkability for their transactions. In this paper we discuss privacy and securi...

متن کامل

Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol

In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of indiv...

متن کامل

Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol

We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...

متن کامل

SCN-SI-021 achieving privacy and access control in pervasive computing environments

This paper focuses on the inherent trade-off between privacy and access control in Pervasive Computing Environments (PCEs). On one hand, service providers require user authentication and authorization for the provision of a service, while at the same time end users require untraceability and unlinkability for their transactions. There are also cases where the anonymity of a specific credential ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015