A New PKI-based Single Sign-On Protocol for a Diminutive Security Device, PANDA, in a Ubiquitous Security Environment
نویسندگان
چکیده
This paper describes the issues and challenges in the design of a new PKI-based security infrastructure enhanced with single sign-on and delegation technology for a diminutive security device in a ubiquitous security environment. In order to provide the PKI-based ubiquitous security infrastructure in consideration of the issues, we propose a PKI-based single signon protocol that provides a user with a transparent security mechanism and seamless authentication services using delegation technology. It also enables cost-effective deployment of the security services by offloading complex PKI operations from the devices to the infrastructure. Although a conventional delegation mechanism cannot support non-repudiation mechanism against malicious user’s behavior, our proposed protocol and security infrastructure can provide the mechanism by devising a referee server that generates binding information between a device and authentication messages, and retains the information in its local storage for future accusation. The detailed design of the protocol and a PKI-based service infrastructure are presented and then protocol analysis is given in terms of a user authentication latency and the protocol’s completeness.
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملPANDA: An Interoperable Mobile Security Card for Ubiquitous Services
This paper describes the issues and challenges in the design of an interoperable mobile security card for campus-wide ubiquitous services. The card holder becomes able to take pleasure of utilizing the ubiquitous services everywhere on a campus with high security. In order to realize the services, the card has been designed to have 1) a ZigBee module for location based services and low power ad...
متن کاملSecuring the Networked e-Business Throughout an Internet Distributed Organization
This paper explores an Internet-based VPN solution, built upon IPSec, which combines tunneling with PKI authentication and encryption. To protect the valuable company resources, an efficient intrusion/misuse detection and response system was incorporated into deployed security solution. This approach enabled a large-scale customer provide their global e-business safely. As a result, an integrat...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملInvestigating the Physical Security Dimensions Affecting Volleyball Stadiums Security
The present study aimed at investigating the physical security dimensions affecting the security of volleyball stadiums in Iran. The study employed a descriptive-exploratory research method conducted on 115 managers and officials in volleyball stadiums, presidents and experts of Provincial Volleyball Boards as well as experts in the field of sports facilities and events as wel...
متن کامل