Non-interactive authentication and confidential information exchange for mobile environments

4Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The growing number of devices that can connect to the Internet has given rise to a new concept that is having much impact nowadays, the Internet of Things. Thus, it is necessary to devise innovative security schemes to become accustomed to this new dimension of the Internet, where everything is connected to everything. This paper describes a new scheme for authentication and exchange of confidential information in the non-secure environment of the Internet of Things. The proposal is based on the concept of non-interactive zero-knowledge proofs, allowing that in a single communication, relevant data may be inferred for verifying the legitimacy of network nodes, and for sharing a session key. The proposal has been developed for the platforms built on the Android Open Source Project so it can be used both in smartphones and wearable devices. This paper provides a full description of the design, implementation and analysis of the proposed scheme. It also includes a comparison to similar schemes, which has revealed promising results.

Cite

CITATION STYLE

APA

Martín-Fernández, F., Caballero-Gil, P., & Caballero-Gil, C. (2015). Non-interactive authentication and confidential information exchange for mobile environments. In Advances in Intelligent Systems and Computing (Vol. 369, pp. 261–271). Springer Verlag. https://doi.org/10.1007/978-3-319-19713-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free