{"title":"基于随机数的异构网络认证","authors":"R. Narmadha, S. Malarkkan","doi":"10.1109/ICCSP.2015.7322763","DOIUrl":null,"url":null,"abstract":"To deal with the increasing demand for heterogeneity, a new authentication protocol have been proposed to increase the efficiency of interworking wireless security; they enable mutual authentication among users in inter and intra domain networks. However, to expand inequitable distribution of heterogeneous networks, an intruder may impersonate a legitimate user's signal. Therefore, a secure legitimate user detection method that can distinguish an allowed user's gesture from an attacker's gesture is needed. To generate a trust relationship between user, base station and home network, a novel approach for authenticating protocol which kowtow heterogeneity requirements. It integrates cryptographic credentials, public/private key of base station, random number challenges to facilitate user detection in the presence of intruders. The random number serves as an association, to enable a home network to verify equivalent certificate carried by the base station per user's request. A key involvement in this paper is a new physical layer authentication technique that enables the base station authentication signals from its associated users.","PeriodicalId":174192,"journal":{"name":"2015 International Conference on Communications and Signal Processing (ICCSP)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Random number based authentication for heterogeneous networks\",\"authors\":\"R. Narmadha, S. Malarkkan\",\"doi\":\"10.1109/ICCSP.2015.7322763\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To deal with the increasing demand for heterogeneity, a new authentication protocol have been proposed to increase the efficiency of interworking wireless security; they enable mutual authentication among users in inter and intra domain networks. However, to expand inequitable distribution of heterogeneous networks, an intruder may impersonate a legitimate user's signal. Therefore, a secure legitimate user detection method that can distinguish an allowed user's gesture from an attacker's gesture is needed. To generate a trust relationship between user, base station and home network, a novel approach for authenticating protocol which kowtow heterogeneity requirements. It integrates cryptographic credentials, public/private key of base station, random number challenges to facilitate user detection in the presence of intruders. The random number serves as an association, to enable a home network to verify equivalent certificate carried by the base station per user's request. A key involvement in this paper is a new physical layer authentication technique that enables the base station authentication signals from its associated users.\",\"PeriodicalId\":174192,\"journal\":{\"name\":\"2015 International Conference on Communications and Signal Processing (ICCSP)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Communications and Signal Processing (ICCSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSP.2015.7322763\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Communications and Signal Processing (ICCSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSP.2015.7322763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Random number based authentication for heterogeneous networks
To deal with the increasing demand for heterogeneity, a new authentication protocol have been proposed to increase the efficiency of interworking wireless security; they enable mutual authentication among users in inter and intra domain networks. However, to expand inequitable distribution of heterogeneous networks, an intruder may impersonate a legitimate user's signal. Therefore, a secure legitimate user detection method that can distinguish an allowed user's gesture from an attacker's gesture is needed. To generate a trust relationship between user, base station and home network, a novel approach for authenticating protocol which kowtow heterogeneity requirements. It integrates cryptographic credentials, public/private key of base station, random number challenges to facilitate user detection in the presence of intruders. The random number serves as an association, to enable a home network to verify equivalent certificate carried by the base station per user's request. A key involvement in this paper is a new physical layer authentication technique that enables the base station authentication signals from its associated users.