無線環境的認證方法及其在電子商務應用之研究 The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce 指導教授: 張真誠 博士 Advisor:Chin-Chen Chang 研究生: 張仕昌 Student:Shin-Chang Chang Department of Computer Science and Information Engineering, National Chung Cheng University
Publication list Journal paper: 16 (SCI: 7 EI: 8) Conference paper: 3 Submitted paper: 8 Details are listed in my thesis
Outline Introduction Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function An On-line Electronic Check System with Mutual Authentication A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Conclusions and Future Works
Introduction Authentication is the act of confirming the truth of an attribute of a datum or entity. Authentication is in everywhere Computer or Notebook Cell phone Bank Facebook Skype …
Introduction (cont.) Authentication types Personal identification Verifying validity of user
Introduction (cont.) Authentication factors: Ownership (ID card, phone, …) Knowledge (password, birthday, …) Inherence (DNA sequence, fingerprint, …)
Introduction (cont.) Authentication tools One-way hash function Symmetric cryptosystems Public Key cryptosystems
Introduction (cont.) Wireless Environment Wireless communications Wireless sensor network Mobile network and communications
Introduction (cont.) Apply a phone number User
Introduction (cont.) Mobile User (MU)
Introduction (cont.) E-Commerce E-Cash E-Check E-Voting E-DRM
Introduction (cont.) OK. First show you id card Hello, I want to apply a cash card
Introduction (cont.) Password
Introduction (cont.) Our Research Objectives : Design user authentication schemes in wireless environment Apply user authentication scheme to e-commerce applications
Requirements: Data confidentiality Data integrity Data authentication Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function Requirements: Data confidentiality Data integrity Data authentication
Registration phase Authentication phase Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Authentication phase register User Host device authenticate Host device User Sensors
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Host device User IDi, PWi Smart card Secure channel
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Authentication phase Host device Sn User DIDi, T DIDi*, Ai, T’
Performance comparisons Watro et al. Wong et al. Das Ours Registration User Tpu+Tpr Host device Tpr 3H Sensor Authentication 2Tpr+H 4H H 2Tpu+H
Performance comparisons (cont.) Watro et al. Wong et al. Das Ours Registration User 1.54 ms/op Host device 1.46 ms/op 0.03 ms/op Sensor Authentication 2.93 ms/op 0.04 ms/op 0.01 ms/op 0.17 ms/op
An On-line Electronic Check System with Mutual Authentication Requirements: Uniqueness Robustness Mutual authentication Non-repudiation
An On-line Electronic Check System with Mutual Authentication (cont.) Registration phase Paying phase register User Bank authenticate User Shop Bank
An On-line Electronic Check System with Mutual Authentication (cont.) Registration phase User Bank ID, α s, j Secure channel
An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User k k’ ID, IDbank, a, b, j, s, C1, C2, T
An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User ID, IDbank, a, b, j, s, C1, C2, T ID, IDbank, a, b, j, s, C1, C2, T
Comparisons I: Uniqueness II: Robustness III: Mutual authentication IV Chen’s method N Y Hsin and Harn’s method Our method I: Uniqueness II: Robustness III: Mutual authentication IV: Non-repudiation
Requirements: Anonymity Authentication Low computational cost A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Requirements: Anonymity Authentication Low computational cost
Authorization Authority (AA) A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment (cont.) Mobile User (MU) Authorization Authority (AA) License Server (LS) Secure channel
Authorization Authority (AA) Mobile User (MU) Authorization Authority (AA) License Server (LS) : transmitted message
Comparisons Chen’s method Chang et al.’s method Ours Mobile User Authorization Authority License Server Chen’s method 6⊕+(5|F|+3)H+1TS 4 ⊕ +(3|F|+2)H+1TPK 3 ⊕ +1H+1 TPK Chang et al.’s method 3⊕ +(2|F|+2)H+1TS 3 ⊕ +(1|F|+1)H+1TPK 5 ⊕ +(2|F|+1)H+1TPK Ours 3 ⊕ +4H+1TS 3 ⊕ +4H 2 ⊕ +4H
Conclusions and Future Works Authentication scheme for wireless sensor networks lower computational cost security Authentication scheme for e-check practicality Authentication scheme for E-DRM
Conclusions and Future Works (cont.) E-Commerce Wireless environment Mobile VANET Cloud computing
Thanks for your listening