無線環境的認證方法及其在電子商務應用之研究

Slides:



Advertisements
Similar presentations
Security Controls and Systems in E-Commerce
Advertisements

E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
Computer and Information Security 期末報告 學號 姓名 莊玉麟.
研 究 生:蔡憲邦 指導教授:柯開維 博士 Design of Efficient and Secure Multiple Wireless Mesh Network 具安全性及自我組織能力的 無線網狀網路.
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards Computer and Information Security Ming-Hong Shih.
孫國偉 Efficient Password authenticated key agreement using smart cards Author : Wen-Shenq Juang* Date : in Computers & Security.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
Improvement of Hwang-Lo-Lin scheme based on an ID-based cryptosystem No author given (Korea information security Agency) Presented by J.Liu.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
1 Authentication and Digital Signature Schemes and Their Applications to E-commerce ( 身份認證與數位簽章技術及其在電子商務上的應用 ) Advisor: Chin-Chen Chang 1, 2 Student: Ya-Fen.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Security Issues in OpenStack Rostyslav Slipetskyy’s Maste’s thesis Submission date: June 2011 Presenter: 陳傑威.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Chapter 9: Payment System for Electronic Commerce.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
A Secure and Efficient Application Download Architecture in 3G Mobile Environment Speaker: Kuo-Zhe Chiou Laboratory of Cryptography and Information Security.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Smart Card Based Authenticated Key Agreement Schemes
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
A Practical Voting Scheme Using One Server with a Secure Coprocessor
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Anonymous Wireless Authentication on a Portable Cellular Mobile System
Security of a Remote Users Authentication Scheme Using Smart Cards
無線通訊的安全技術及電子商務應用之研究 Security Technologies on Wireless Communications and Applications in Electronic Commerce 指導教授: 張真誠 教授 研究生: 李榮三 Dept. of Computer Science.
BY GAWARE S.R. DEPT.OF COMP.SCI
Chair Professor Chin-Chen Chang Feng Chia University
Efficient CRT-Based RSA Cryptosystems
Recent Developments on Multimedia and Secure Networking Technologies
Authors : Parwinder Kaur Dhillon and Sheetal Kalra
Secure Electronic Transaction (SET) University of Windsor
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
Security and Privacy in Pervasive/Ubiquitous Computing Systems
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Recent Developments on Multimedia and Secure Networking Technologies
Source: Computer Networks Volume 149, 11 February 2019, Pages 29-42
II. REVIEW OF THE DAS ET AL. SCHEME
Improvement of Chien et al
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
Presentation transcript:

無線環境的認證方法及其在電子商務應用之研究 The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce 指導教授: 張真誠 博士 Advisor:Chin-Chen Chang 研究生: 張仕昌 Student:Shin-Chang Chang Department of Computer Science and Information Engineering, National Chung Cheng University

Publication list Journal paper: 16 (SCI: 7 EI: 8) Conference paper: 3 Submitted paper: 8 Details are listed in my thesis

Outline Introduction Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function An On-line Electronic Check System with Mutual Authentication A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Conclusions and Future Works

Introduction Authentication is the act of confirming the truth of an attribute of a datum or entity. Authentication is in everywhere Computer or Notebook Cell phone Bank Facebook Skype …

Introduction (cont.) Authentication types Personal identification Verifying validity of user

Introduction (cont.) Authentication factors: Ownership (ID card, phone, …) Knowledge (password, birthday, …) Inherence (DNA sequence, fingerprint, …)

Introduction (cont.) Authentication tools One-way hash function Symmetric cryptosystems Public Key cryptosystems

Introduction (cont.) Wireless Environment Wireless communications Wireless sensor network Mobile network and communications

Introduction (cont.) Apply a phone number User

Introduction (cont.) Mobile User (MU)

Introduction (cont.) E-Commerce E-Cash E-Check E-Voting E-DRM

Introduction (cont.) OK. First show you id card Hello, I want to apply a cash card

Introduction (cont.) Password

Introduction (cont.) Our Research Objectives : Design user authentication schemes in wireless environment Apply user authentication scheme to e-commerce applications

Requirements: Data confidentiality Data integrity Data authentication Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function Requirements: Data confidentiality Data integrity Data authentication

Registration phase Authentication phase Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Authentication phase register User Host device authenticate Host device User Sensors

Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Host device User IDi, PWi Smart card Secure channel

Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Authentication phase Host device Sn User DIDi, T DIDi*, Ai, T’

Performance comparisons Watro et al. Wong et al. Das Ours Registration User Tpu+Tpr Host device Tpr 3H Sensor Authentication 2Tpr+H 4H H 2Tpu+H

Performance comparisons (cont.) Watro et al. Wong et al. Das Ours Registration User 1.54 ms/op Host device 1.46 ms/op 0.03 ms/op Sensor Authentication 2.93 ms/op 0.04 ms/op 0.01 ms/op 0.17 ms/op

An On-line Electronic Check System with Mutual Authentication Requirements: Uniqueness Robustness Mutual authentication Non-repudiation

An On-line Electronic Check System with Mutual Authentication (cont.) Registration phase Paying phase register User Bank authenticate User Shop Bank

An On-line Electronic Check System with Mutual Authentication (cont.) Registration phase User Bank ID, α s, j Secure channel

An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User k k’ ID, IDbank, a, b, j, s, C1, C2, T

An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User ID, IDbank, a, b, j, s, C1, C2, T ID, IDbank, a, b, j, s, C1, C2, T

Comparisons I: Uniqueness II: Robustness III: Mutual authentication IV Chen’s method N Y Hsin and Harn’s method Our method I: Uniqueness II: Robustness III: Mutual authentication IV: Non-repudiation

Requirements: Anonymity Authentication Low computational cost A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Requirements: Anonymity Authentication Low computational cost

Authorization Authority (AA) A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment (cont.) Mobile User (MU) Authorization Authority (AA) License Server (LS) Secure channel

Authorization Authority (AA) Mobile User (MU) Authorization Authority (AA) License Server (LS) : transmitted message

Comparisons Chen’s method Chang et al.’s method Ours Mobile User Authorization Authority License Server Chen’s method 6⊕+(5|F|+3)H+1TS 4 ⊕ +(3|F|+2)H+1TPK 3 ⊕ +1H+1 TPK Chang et al.’s method 3⊕ +(2|F|+2)H+1TS 3 ⊕ +(1|F|+1)H+1TPK 5 ⊕ +(2|F|+1)H+1TPK Ours 3 ⊕ +4H+1TS 3 ⊕ +4H 2 ⊕ +4H

Conclusions and Future Works Authentication scheme for wireless sensor networks lower computational cost security Authentication scheme for e-check practicality Authentication scheme for E-DRM

Conclusions and Future Works (cont.) E-Commerce Wireless environment Mobile VANET Cloud computing

Thanks for your listening