1 / 33

Novel Authentication Schemes in Wireless Environment for E-Commerce Applications

This study focuses on authentication methods in wireless environments and their application in e-commerce. The research explores efficient user authentication protocols, secure electronic check systems, and digital rights management mechanisms. It investigates factors like data integrity, confidentiality, and user verification. The study aims to enhance security and practicality in online transactions. The research outcomes and future works are discussed, emphasizing the significance of authentication in various digital platforms.

ransoms
Download Presentation

Novel Authentication Schemes in Wireless Environment for E-Commerce Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 無線環境的認證方法及其在電子商務應用之研究無線環境的認證方法及其在電子商務應用之研究 The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce 指導教授: 張真誠 博士 Advisor:Chin-Chen Chang 研究生: 張仕昌 Student:Shin-Chang Chang Department of Computer Science and Information Engineering, National Chung Cheng University

  2. Publication list • Journal paper: 16 (SCI: 7 EI: 8) • Conference paper: 3 • Submitted paper: 8 • Details are listed in my thesis

  3. Outline • Introduction • Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function • An On-line Electronic Check System with Mutual Authentication • A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment • Conclusions and Future Works

  4. Introduction • Authentication is the act of confirming the truth of an attribute of a datum or entity. • Authentication is in everywhere • Computer or Notebook • Cell phone • Bank • Facebook • Skype • …

  5. Introduction (cont.) • Authentication types • Personal identification • Verifying validity of user

  6. Introduction (cont.) • Authentication factors: • Ownership (ID card, phone, …) • Knowledge (password, birthday, …) • Inherence (DNA sequence, fingerprint, …)

  7. Introduction (cont.) • Authentication tools • One-way hash function • Symmetric cryptosystems • Public Key cryptosystems

  8. Introduction (cont.) • Wireless Environment • Wireless communications • Wireless sensor network • Mobile network and communications

  9. Introduction (cont.) Apply a phone number User

  10. Introduction (cont.) Mobile User (MU)

  11. Introduction (cont.) • E-Commerce • E-Cash • E-Check • E-Voting • E-DRM

  12. Introduction (cont.) OK. First show you id card Hello, I want to apply a cash card

  13. Introduction (cont.) Password

  14. Introduction (cont.) • Our Research Objectives : • Design user authentication schemes in wireless environment • Apply user authentication scheme to e-commerce applications

  15. Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function • Requirements: • Data confidentiality • Data integrity • Data authentication

  16. Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) • Registration phase • Authentication phase register User Host device authenticate Host device User Sensors

  17. Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Host device User IDi, PWi Smart card Secure channel

  18. Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Authentication phase Sn Host device User DIDi, T DIDi*, Ai, T’

  19. Performance comparisons

  20. Performance comparisons (cont.)

  21. An On-line Electronic Check System with Mutual Authentication • Requirements: • Uniqueness • Robustness • Mutual authentication • Non-repudiation

  22. An On-line Electronic Check System with Mutual Authentication (cont.) • Registration phase • Paying phase register User Bank authenticate Shop User Bank

  23. An On-line Electronic Check System with Mutual Authentication (cont.) Registration phase User Bank ID, α s, j Secure channel

  24. An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User k k’ ID, IDbank, a, b, j, s, C1, C2, T

  25. An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User ID, IDbank, a, b, j, s, C1, C2, T ID, IDbank, a, b, j, s, C1, C2, T

  26. Comparisons • I: Uniqueness • II: Robustness • III: Mutual authentication • IV: Non-repudiation

  27. A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment • Requirements: • Anonymity • Authentication • Low computational cost

  28. A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment (cont.) Mobile User (MU) Authorization Authority (AA) License Server (LS) Secure channel

  29. Mobile User (MU) Authorization Authority (AA) License Server (LS) : transmitted message

  30. Comparisons

  31. Conclusions and Future Works • Authentication scheme for wireless sensor networks • lower computational cost • security • Authentication scheme for e-check • practicality • security • Authentication scheme for E-DRM • lower computational cost • security

  32. Conclusions and Future Works (cont.) • E-Commerce • Wireless environment • Mobile • VANET • Cloud computing

  33. Thanks for your listening

More Related