scholarly journals Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things

Author(s):  
Chulhee Cho ◽  
Byung-Hun Song ◽  
Jongpil Jeong ◽  
Tai-Myoung Chung
2014 ◽  
Vol 631-632 ◽  
pp. 906-909
Author(s):  
Wei Jing Li ◽  
Ping Zhu ◽  
Hua Zhang ◽  
Zheng Ping Jin

Recently, many mobile user authentication schemes with user anonymity for wireless communications have been proposed. In 2012, Li and Lee proposed a novel user authentication and privacy preserving scheme with smart cards for wireless communications. In 2013, Jeon et al. proposed an improved user authentication scheme, and claimed their scheme achieves user anonymity and more efficient. On the basis of their work, we put forward a new user authentication scheme using elliptic curve cryptography with user anonymity for wireless communications. The security and performance analysis show that the new scheme is more secure and efficient for wireless communications.


Author(s):  
Tieyan Li

The multimedia community is moving from monolithic applications to more flexible and scalable proliferate solutions. Security issues such as access control and authentication of multimedia content have been intensively studied in the literature. In particular, stream authentication tends to be more complicated since a stream may be transcoded by intermediate proxies or composed by multiple sources. Traditional stream authentication schemes consider a stream as a group of packets and authenticate these packets over an erasure channel. However, by fixing the packets in transmission, any packet manipulation will cause authentication failure. In this chapter, we assume a more flexible model where a proxy, between a sender and a receiver, is able to make transcoding operations over a stream. We describe a flexible stream authentication framework that allows the so called packet independent stream authentication schemes to make transcoding operations on the packets and commit the changes, which are not applicable n packet-based stream authentication schemes. Such a stream authentication scheme based on the layered structure of a stream is elaborated in details w.r.t., the encoding, packing, amortizing, and verifying methods. The security and performance analysis show that the packet independent stream authentication schemes achieve higher authentication rate with less overhead per packet, as compared with that of packet based schemes.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 19646-19656
Author(s):  
Shijie Shi ◽  
Suqin Pang ◽  
Yitong Li ◽  
Fasong Wang ◽  
Haris Gacanin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document