Secure Authentication in Group Communications Using Media Access Control (MAC) Address

نویسندگان

  • Sunghyuck Hong
  • Jeff Baker
  • Jaeki Song
چکیده

We propose adding users’ Media Access Control (MAC) addresses to standard X.509 certificates to provide more secure authentication. Recent patents demonstrate efforts on a X.509 certificate by adding security features in order to establish secure communications. The MAC address can be added by the issuing Certification Authority (CA) to the “extensions” section of the X.509 certificate. We demonstrate that when two users with MAC address information on their digital certificates communicate, the MAC address on the first user’s certificate can be easily verified by the second user. In this way, security can be improved without markedly degrading system performance and the level of initial trust between participants in virtual communities can be enhanced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Authentication in Virtual Community by Using Media Access Control address (MAC)

─ The Internet networking is getting more popular in Virtual community which must have a strong security feature to protect member’s privacy and message integrity. Without using a strong security feature in virtual community, virtual community will not accomplish the goal to communicate with members in developing common interests. However, all systems can be hacked, and there are no exceptions ...

متن کامل

Highly Secure Network Switches with Quantum Key Distribution Systems

We have developed network “switches” with security enhanced by “quantum key distribution (QKD) systems”. In a Layer 2 “switch”, media access control (MAC) addresses are encrypted to prevent unauthorized access from internal network. After an initial authentication, common random key bits are shared between the Layer 2 “switch” and users. MAC addresses are encrypted with shared key at every pack...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

CBDAT: Cross Layer Based Detection and Authentication Technique for MANET

Mobile adhoc networks (MANETs) are prone to many security attacks and risks due to its characteristics such as mobility, lack of infrastructure and dynamic topology changes. In this paper, we propose CBDAT, a cross layer based detection and authentication technique for MANET. Our technique defines the observer node to monitor the neighbor transmissions and to compute the trust values. The obser...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010