12-12-2012, 06:26 PM
Authentication Protocols for E-Commerce Applications
Authentication Protocols.ppt (Size: 539 KB / Downloads: 28)
Introduction (1/3)
User Authentication:
Personal Identification
Authentication
Authentication Methods:
Biometrics: fingerprint, hand geometry, voiceprint, etc.
Cryptography: password, symmetric cryptosystems, public key cryptosystems, etc.
Our Research Directions:
Authentication protocols for limited-power and low computational ability devices
(mobile devices and sensor networks)
Authentication protocols for e-commerce applications
Practical and efficient electronic payment model
ID-Based Cryptosystem (Shamir, 1984):
Using an unique identification (ID) as a public key
No public key
No public key table
No certificate
No key authentication center
Sensor Networks:
A wireless network which is composed of many sensors.
The sensor is characterized by limited power supply, low computation ability, and small memory size.
Sensor networks can be used for battlefield, medical devices, home monitoring, etc.
Authentication with Key Agreement (AKA) Protocols:
Authentication + session key agreement
Authentication: verifying the validity of the sensors
Session key agreement: encrypting the collected data
AKA can be applied to secure communications on sensor networks.