Download presentation
Presentation is loading. Please wait.
1
無線環境的認證方法及其在電子商務應用之研究
The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce 指導教授: 張真誠 博士 Advisor:Chin-Chen Chang 研究生: 張仕昌 Student:Shin-Chang Chang Department of Computer Science and Information Engineering, National Chung Cheng University
2
Publication list Journal paper: 16 (SCI: 7 EI: 8) Conference paper: 3
Submitted paper: 8 Details are listed in my thesis
3
Outline Introduction Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function An On-line Electronic Check System with Mutual Authentication A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Conclusions and Future Works
4
Introduction Authentication is the act of confirming the truth of an attribute of a datum or entity. Authentication is in everywhere Computer or Notebook Cell phone Bank Facebook Skype …
5
Introduction (cont.) Authentication types Personal identification
Verifying validity of user
6
Introduction (cont.) Authentication factors:
Ownership (ID card, phone, …) Knowledge (password, birthday, …) Inherence (DNA sequence, fingerprint, …)
7
Introduction (cont.) Authentication tools One-way hash function
Symmetric cryptosystems Public Key cryptosystems
8
Introduction (cont.) Wireless Environment Wireless communications
Wireless sensor network Mobile network and communications
9
Introduction (cont.) Apply a phone number User
10
Introduction (cont.) Mobile User (MU)
11
Introduction (cont.) E-Commerce E-Cash E-Check E-Voting E-DRM
12
Introduction (cont.) OK. First show you id card
Hello, I want to apply a cash card
13
Introduction (cont.) Password
14
Introduction (cont.) Our Research Objectives :
Design user authentication schemes in wireless environment Apply user authentication scheme to e-commerce applications
15
Requirements: Data confidentiality Data integrity Data authentication
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function Requirements: Data confidentiality Data integrity Data authentication
16
Registration phase Authentication phase
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Authentication phase register User Host device authenticate Host device User Sensors
17
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Host device User IDi, PWi Smart card Secure channel
18
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Authentication phase Host device Sn User DIDi, T DIDi*, Ai, T’
19
Performance comparisons
Watro et al. Wong et al. Das Ours Registration User Tpu+Tpr Host device Tpr 3H Sensor Authentication 2Tpr+H 4H H 2Tpu+H
20
Performance comparisons (cont.)
Watro et al. Wong et al. Das Ours Registration User 1.54 ms/op Host device 1.46 ms/op 0.03 ms/op Sensor Authentication 2.93 ms/op 0.04 ms/op 0.01 ms/op 0.17 ms/op
21
An On-line Electronic Check System with Mutual Authentication
Requirements: Uniqueness Robustness Mutual authentication Non-repudiation
22
An On-line Electronic Check System with Mutual Authentication (cont.)
Registration phase Paying phase register User Bank authenticate User Shop Bank
23
An On-line Electronic Check System with Mutual Authentication (cont.)
Registration phase User Bank ID, α s, j Secure channel
24
An On-line Electronic Check System with Mutual Authentication (cont.)
Paying phase Bank Shop User k k’ ID, IDbank, a, b, j, s, C1, C2, T
25
An On-line Electronic Check System with Mutual Authentication (cont.)
Paying phase Bank Shop User ID, IDbank, a, b, j, s, C1, C2, T ID, IDbank, a, b, j, s, C1, C2, T
26
Comparisons I: Uniqueness II: Robustness III: Mutual authentication
IV Chen’s method N Y Hsin and Harn’s method Our method I: Uniqueness II: Robustness III: Mutual authentication IV: Non-repudiation
27
Requirements: Anonymity Authentication Low computational cost
A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment Requirements: Anonymity Authentication Low computational cost
28
Authorization Authority (AA)
A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment (cont.) Mobile User (MU) Authorization Authority (AA) License Server (LS) Secure channel
29
Authorization Authority (AA)
Mobile User (MU) Authorization Authority (AA) License Server (LS) : transmitted message
30
Comparisons Chen’s method Chang et al.’s method Ours Mobile User
Authorization Authority License Server Chen’s method 6⊕+(5|F|+3)H+1TS 4 ⊕ +(3|F|+2)H+1TPK 3 ⊕ +1H+1 TPK Chang et al.’s method 3⊕ +(2|F|+2)H+1TS 3 ⊕ +(1|F|+1)H+1TPK 5 ⊕ +(2|F|+1)H+1TPK Ours 3 ⊕ +4H+1TS 3 ⊕ +4H 2 ⊕ +4H
31
Conclusions and Future Works
Authentication scheme for wireless sensor networks lower computational cost security Authentication scheme for e-check practicality Authentication scheme for E-DRM
32
Conclusions and Future Works (cont.)
E-Commerce Wireless environment Mobile VANET Cloud computing
33
Thanks for your listening
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.