Efficient HMAC Based Message Authentication System for Mobile Environment
Keywords:
Secured Communication, MAC, HMAC, Stream ciphers, Signcryption Challenge response, Digital 2013;Signatures
Abstract
Computationally constrained environments like Rfid, sensors and hand held devices require noncontact automatic identification technology. The wireless communication channel of these systems is vulnerable to various malicious attacks and has limited calculation resources and small storage capacity, aimed at these problems, a HMAC-based lightweight authentication protocol has been proposed. The main aim of the proposed protocol is that the calculation capacity and storage space of reader should be utilized efficiently, and the demand for the capacity of calculation and storage of device should be reduced. The analysis of security and performance show that the new protocol can resist some malicious attacks, such as spoofing attack, replay attack, tracking, etc., and is suitable for low-cost and computationally constrained system.
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2011-07-15
Issue
Section
License
Copyright (c) 2011 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.