Presentation is loading. Please wait.

Presentation is loading. Please wait.

無線環境的認證方法及其在電子商務應用之研究

Similar presentations


Presentation on theme: "無線環境的認證方法及其在電子商務應用之研究"— Presentation transcript:

1 無線環境的認證方法及其在電子商務應用之研究
The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce 指導教授: 張真誠 博士 Advisor:Chin-Chen Chang 研究生: 張仕昌 Student:Shin-Chang Chang Department of Computer Science and Information Engineering, National Chung Cheng University

2 Publication list Journal paper: 16 (SCI: 7 EI: 8) Conference paper: 3
Submitted paper: 8 Details are listed in my thesis

3 Outline Introduction Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function An On-line Electronic Check System with Mutual Authentication A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Conclusions and Future Works

4 Introduction Authentication is the act of confirming the truth of an attribute of a datum or entity. Authentication is in everywhere Computer or Notebook Cell phone Bank Facebook Skype

5 Introduction (cont.) Authentication types Personal identification
Verifying validity of user

6 Introduction (cont.) Authentication factors:
Ownership (ID card, phone, …) Knowledge (password, birthday, …) Inherence (DNA sequence, fingerprint, …)

7 Introduction (cont.) Authentication tools One-way hash function
Symmetric cryptosystems Public Key cryptosystems

8 Introduction (cont.) Wireless Environment Wireless communications
Wireless sensor network Mobile network and communications

9 Introduction (cont.) Apply a phone number User

10 Introduction (cont.) Mobile User (MU)

11 Introduction (cont.) E-Commerce E-Cash E-Check E-Voting E-DRM

12 Introduction (cont.) OK. First show you id card
Hello, I want to apply a cash card

13 Introduction (cont.) Password

14 Introduction (cont.) Our Research Objectives :
Design user authentication schemes in wireless environment Apply user authentication scheme to e-commerce applications

15 Requirements: Data confidentiality Data integrity Data authentication
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function Requirements: Data confidentiality Data integrity Data authentication

16 Registration phase Authentication phase
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Authentication phase register User Host device authenticate Host device User Sensors

17 Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Host device User IDi, PWi Smart card Secure channel

18 Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Authentication phase Host device Sn User DIDi, T DIDi*, Ai, T’

19 Performance comparisons
Watro et al. Wong et al. Das Ours Registration User Tpu+Tpr Host device Tpr 3H Sensor Authentication 2Tpr+H 4H H 2Tpu+H

20 Performance comparisons (cont.)
Watro et al. Wong et al. Das Ours Registration User 1.54 ms/op Host device 1.46 ms/op 0.03 ms/op Sensor Authentication 2.93 ms/op 0.04 ms/op 0.01 ms/op 0.17 ms/op

21 An On-line Electronic Check System with Mutual Authentication
Requirements: Uniqueness Robustness Mutual authentication Non-repudiation

22 An On-line Electronic Check System with Mutual Authentication (cont.)
Registration phase Paying phase register User Bank authenticate User Shop Bank

23 An On-line Electronic Check System with Mutual Authentication (cont.)
Registration phase User Bank ID, α s, j Secure channel

24 An On-line Electronic Check System with Mutual Authentication (cont.)
Paying phase Bank Shop User k k’ ID, IDbank, a, b, j, s, C1, C2, T

25 An On-line Electronic Check System with Mutual Authentication (cont.)
Paying phase Bank Shop User ID, IDbank, a, b, j, s, C1, C2, T ID, IDbank, a, b, j, s, C1, C2, T

26 Comparisons I: Uniqueness II: Robustness III: Mutual authentication
IV Chen’s method N Y Hsin and Harn’s method Our method I: Uniqueness II: Robustness III: Mutual authentication IV: Non-repudiation

27 Requirements: Anonymity Authentication Low computational cost
A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Requirements: Anonymity Authentication Low computational cost

28 Authorization Authority (AA)
A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment (cont.) Mobile User (MU) Authorization Authority (AA) License Server (LS) Secure channel

29 Authorization Authority (AA)
Mobile User (MU) Authorization Authority (AA) License Server (LS) : transmitted message

30 Comparisons Chen’s method Chang et al.’s method Ours Mobile User
Authorization Authority License Server Chen’s method 6⊕+(5|F|+3)H+1TS 4 ⊕ +(3|F|+2)H+1TPK 3 ⊕ +1H+1 TPK Chang et al.’s method 3⊕ +(2|F|+2)H+1TS 3 ⊕ +(1|F|+1)H+1TPK 5 ⊕ +(2|F|+1)H+1TPK Ours 3 ⊕ +4H+1TS 3 ⊕ +4H 2 ⊕ +4H

31 Conclusions and Future Works
Authentication scheme for wireless sensor networks lower computational cost security Authentication scheme for e-check practicality Authentication scheme for E-DRM

32 Conclusions and Future Works (cont.)
E-Commerce Wireless environment Mobile VANET Cloud computing

33 Thanks for your listening


Download ppt "無線環境的認證方法及其在電子商務應用之研究"

Similar presentations


Ads by Google