Explore chapters and articles related to this topic
A Comparative Analysis of Classical Cryptography versus Quantum Cryptography for Web of Medical Things (WoMT)
Published in Aboul Ella Hassanien, Nilanjan Dey, Surekha Borra, Medical Big Data and Internet of Medical Things, 2018
K. Anitha Kumari, G. Sudha Sadasivam
An authentication protocol provides high protection to credentials against threats and attacks. Essential properties of authentication protocols are: Credentials must be transmitted in encrypted formCredentials must be transmitted through a secure linkCredentials must be stored after being encrypted/one-way hashedKeys established for the session should be one-way hashed using acceptable hashing algorithmsLimited login attemptsNo traces of previously used session keysProtecting credentials from commonly occurring attacks
Digital Rights Management Issues for Video
Published in Borko Furht, Darko Kirovski, Multimedia Encryption and Authentication Techniques and Applications, 2006
Sabu Emmanuel, Mohan S. Kankanhalli
Cryptographic techniques provide confidentiality, authentication, data integrity, and nonrepudiation functions. They are also designed for traitor tracing. However, in the DRM world, cryptographic techniques are primarily used for providing media confidentiality, trading party authentication, and trading protocol nonrepudiation. There are well-established party authentication protocols such as Kerberos, X.509, and so forth. Some of these are based on a symmetric key cryptosystem, whereas others are based on public key infrastructure. They authenticate the parties involved and also, if necessary, hand over secrets such as keys for confidential communication. The confidential communication may be intended to transfer payment information and also may be the medium in transaction. Free video with tracing requirement and pay video need confidentiality to be implemented. Conditional access (CA) systems, which implement confidentiality through a scrambling technique, are used in most subscription-based video systems [26,27]. The nonrepudiation function provides for nonrepudiation of the trading agreement. It is easy to combine the party authentication, trading agreement nonrepudiation, and payment function into a trading protocol, as they are usually one-to-one protocols and take place before the delivery of media.
Digital Rights Management Issues for Video
Published in Borko Furht, Darko Kirovski, Multimedia Security Handbook, 2004
Sabu Emmanuel, Mohan S. Kankanhalli
Cryptographic techniques provide confidentiality, authentication, data integrity, and nonrepudiation functions. They are also designed for traitor tracing. However, in the DRM world, cryptographic techniques are primarily used for providing media confidentiality, trading party authentication, and trading protocol nonrepudiation. There are well-established party authentication protocols such as Kerberos, X.509, and so forth. Some of these are based on symmetric key cryptosystem, whereas others are based on public key infrastructure. They authenticate the parties involved and also, if necessary, hand over secrets such as keys for confidential communication. The confidential communication may be intended to transfer payment information and also may be the media in transaction. Free video with tracing requirement and pay video need confidentiality to be implemented. Conditional access (CA) systems, which implement confidentiality through a scrambling technique, are used in most of the subscription-based video systems [26,27]. The nonrepudiation function provides for nonrepudiation of the trading agreement. It is easy to combine the party authentication, trading agreement nonrepudiation, and payment function into a trading protocol, as they are usually one-to-one protocols and take place before the delivery of media.
A mutual authentication and key update protocol in satellite communication network
Published in Automatika, 2020
Congyu Huang, Zijian Zhang, Meng Li, Liehuang Zhu, Zhengjia Zhu, Xiaoxian Yang
There are various of authentication and key exchange protocols designed for authenticating entities in wireless communication networks. For instance, Lu et al. [20] proposed an authentication and key agreement protocol based on 3GPP authentication and key agreement protocol. But it is not suitable to use in satellite networks due to its huge resources requirement. Zeng et al. [21] also proposed an efficient anonymous user authentication protocol for mobile Internet of things. However, it took too much computation cost if it was directly used in satellite communication networks. Lin et al. [22] proposed an efficient dynamic authentication protocol. It reduced space storage and key management complexity without using verification table. But the computation cost of the protocol is too heavy to be deployed in satellites with limited computation resources.
Design of An Authentication Scheme for Cloud-Based IoT Applications*
Published in IETE Technical Review, 2022
Sampa Sahoo, Shreeya Swagatika Sahoo, Bibhudatta Sahoo, Ashok Kumar Turuk
Various security challenges associated with a cloud-based IoT system are as follows: a legitimate IoT device can be replaced by an attacker's device for access and manipulation of data. An attacker can get access and modify the routing path of data in transit. Besides, if an attacker steals the details of user credentials like login and password, then the system will be at high risk. This confirms the necessity of an adequate authentication scheme for cloud-based IoT applications. This section presents the proposed authentication protocol. In this scheme, the cloud node act as a trusted key manager and allows a registered user to access data more than once. For discussing and analyzing the proposed scheme, we use the hash function.
Exploring the RFID mutual authentication domain
Published in International Journal of Computers and Applications, 2021
Syed Muhammad Mohsin, Imran Ali Khan, Syed Muhammad Abrar Akber, Shahaboddin Shamshirband, Anthony T. Chronopoulos
Mutual authentication or two-way authentication is the process that lets the entities involved in communication to verify the originality of each other. Mutual authentication should be provided in a way that it should provide immunity against the man-in-the-middle attack and replay attack [37]. Moreover, the mutual authentication protocol should be efficient. Different types of mutual authentication protocols are proposed by the research community to provide therequired security services for resource-constrained devices [27,37,39–44].