LightBlog
Contact at mumbai.academics@gmail.com or 8097636691/9323040215
Responsive Ads Here

Thursday, 22 February 2018

efficient authentication for mobile and pervasive computing(2014)


efficient authentication for mobile and pervasive 

computing(2014)

Abstract:
With today’s technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In  a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives.
Existing System:
There are two important observations to make about existing MAC algorithms. First, they are designed independently of any other operations required to be performed on the message to be authenticated. For instance, if the authenticated message must also be encrypted, existing MACs are not designed to utilize the functionality that can be provided by the underlying encryption algorithm. Second, most existing MACs are designed for the general   computer communication systems, independently of the properties that messages can possess. For example, one can find that most existing MACs are inefficient when the messages to be authenticated are short. (For instance, UMAC, the fastest reported message authentication code in the cryptographic literature,  has undergone large algorithmic changes to increase its speed on short messages ).
Disadvantages:
1.Existing MACs are not designed to utilize the functionality that can be provided by the underlying encryption algorithm.
2.Most existing MACs are designed for the general   computer communication systems, independently of the properties that messages can possess.
Proposed System:
We propose the following research question: if there is an application in which messages that need to be exchanged are short and both their privacy and integrity need to be preserved, can one do better than simply encrypting the messages using an encryption algorithm and authenticating them using standard MAC algorithm? We answer the question by proposing two new techniques for authenticating short encrypted messages that are more efficient than existing approaches. In the first technique, we utilize the fact that the message to be authenticated is also encrypted, with any secure encryption algorithm, to append a short random string to be used in the authentication process.
Advantages:
1.More security, using two concepts one is mobile computing and another one is pervasive computing.
2.The random strings used for different operations are independent, the authentication algorithm can benefit from the simplicity of unconditional secure authentication to allow for faster and more efficient authentication, without the difficulty to manage one-time keys. In the second technique, we make the extra assumption that the used encryption algorithm is block cipher based to further improve the computational efficiency of the first technique.
SYSTEM SPECIFICATION
Hardware Requirements:
•          System                               :   Pentium IV 3.5 GHz.
•          Hard Disk                          :   40 GB.
•          Floppy Drive                     :   1.44 Mb.
•          Monitor                              :   14’ Colour Monitor.
•          Mouse                                :   Optical Mouse.
•          Ram                                   :   1 GB.
Software Requirements:
•          Operating system                :   Windows XP or Windows 7, Windows 8.
•          Coding Language              :   J2EE
•          Data Base                            :   My Sql.
•          Documentation                   :  MS Office
•          IDE                                        : Eclipse Galileo
•          Development Kit                 : JDK 1.6

No comments:

Post a Comment