Efficient Authentication for Mobile and Pervasive Computing
ABSTRACT:
With today’s
technology, many applications rely on the existence of small devices that can
exchange information and form communication networks. In a significant portion
of such applications, the confidentiality and integrity of the communicated
messages are of particular interest. In this work, we propose two novel
techniques for authenticating short encrypted messages that are directed to
meet the requirements of mobile and pervasive applications. By taking advantage
of the fact that the message to be authenticated must also be encrypted, we
propose provably secure authentication codes that are more efficient than any
message authentication code in the literature. The key idea behind the proposed
techniques is to utilize the security that the encryption algorithm can provide
to design more efficient authentication mechanisms, as opposed to using
standalone authentication primitives.
EXISTING SYSTEM:
A popular class of unconditionally secure
authentication is based on universal hash-function families, pioneered by Carter
and Wegman. Since then, the study of unconditionally secure message
authentication based on universal hash functions has been attracting research attention,
both from the design and analysis standpoints
DISADVANTAGES
OF EXISTING SYSTEM:
Ø Unconditionally secure universal hashing-based MACs
are considered impractical in most modern applications, due to the difficulty
of managing one-time keys
PROPOSED SYSTEM:
Ø In this paper we propose two new techniques for
authenticating short encrypted messages that are more efficient than existing
approaches.
Ø In the first technique, we utilize the fact that the
message to be authenticated is also encrypted, with any secure encryption
algorithm, to append a short random string to be used in the authentication
process. Since the random strings used for different operations are
independent, the authentication algorithm can benefit from the simplicity of
unconditional secure authentication to allow for faster and more efficient
authentication, without the difficulty to manage one-time keys.
Ø In the second
technique, we make the extra assumption that the used encryption algorithm is
block cipher based to further improve the computational efficiency of the first
technique. The driving motive behind our investigation is that using a general
purpose MAC algorithm to authenticate exchanged messages in such systems might
not be the most efficient solution and can lead to waste of resources already
available, namely, the security that is provided by the encryption algorithm.
ADVANTAGES
OF PROPOSED SYSTEM:
Ø More efficient than existing approaches.
Ø The authentication algorithm can benefit from the
simplicity of unconditional secure authentication to allow for faster and more
efficient authentication, without the difficulty to manage one-time keys.
Ø The most efficient solution and can lead to waste of resources
already available, namely, the security that is provided by the encryption
algorithm.
SYSTEM
REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø
System : Pentium IV 2.4 GHz.
Ø
Hard Disk :
40 GB.
Ø
Floppy Drive : 1.44
Mb.
Ø
Monitor : 15
VGA Colour.
Ø
Mouse :
Logitech.
Ø Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
Ø Operating system : Windows
XP/7.
Ø Coding Language : JAVA/J2EE
Ø IDE : Netbeans 7.4
Ø Database : MYSQL
REFERENCE:
Basel
Alomair,and Radha Poovendran, “Efficient
Authentication for Mobile and Pervasive Computing”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014
No comments:
Post a Comment