330 likes | 342 Views
This study focuses on authentication methods in wireless environments and their application in e-commerce. The research explores efficient user authentication protocols, secure electronic check systems, and digital rights management mechanisms. It investigates factors like data integrity, confidentiality, and user verification. The study aims to enhance security and practicality in online transactions. The research outcomes and future works are discussed, emphasizing the significance of authentication in various digital platforms.
E N D
無線環境的認證方法及其在電子商務應用之研究無線環境的認證方法及其在電子商務應用之研究 The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce 指導教授: 張真誠 博士 Advisor:Chin-Chen Chang 研究生: 張仕昌 Student:Shin-Chang Chang Department of Computer Science and Information Engineering, National Chung Cheng University
Publication list • Journal paper: 16 (SCI: 7 EI: 8) • Conference paper: 3 • Submitted paper: 8 • Details are listed in my thesis
Outline • Introduction • Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function • An On-line Electronic Check System with Mutual Authentication • A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment • Conclusions and Future Works
Introduction • Authentication is the act of confirming the truth of an attribute of a datum or entity. • Authentication is in everywhere • Computer or Notebook • Cell phone • Bank • Facebook • Skype • …
Introduction (cont.) • Authentication types • Personal identification • Verifying validity of user
Introduction (cont.) • Authentication factors: • Ownership (ID card, phone, …) • Knowledge (password, birthday, …) • Inherence (DNA sequence, fingerprint, …)
Introduction (cont.) • Authentication tools • One-way hash function • Symmetric cryptosystems • Public Key cryptosystems
Introduction (cont.) • Wireless Environment • Wireless communications • Wireless sensor network • Mobile network and communications
Introduction (cont.) Apply a phone number User
Introduction (cont.) Mobile User (MU)
Introduction (cont.) • E-Commerce • E-Cash • E-Check • E-Voting • E-DRM
Introduction (cont.) OK. First show you id card Hello, I want to apply a cash card
Introduction (cont.) Password
Introduction (cont.) • Our Research Objectives : • Design user authentication schemes in wireless environment • Apply user authentication scheme to e-commerce applications
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function • Requirements: • Data confidentiality • Data integrity • Data authentication
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) • Registration phase • Authentication phase register User Host device authenticate Host device User Sensors
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Registration phase Host device User IDi, PWi Smart card Secure channel
Novel Efficient User Authentication Protocol for Wireless Sensor Networks Using One-way Hash Function (cont.) Authentication phase Sn Host device User DIDi, T DIDi*, Ai, T’
An On-line Electronic Check System with Mutual Authentication • Requirements: • Uniqueness • Robustness • Mutual authentication • Non-repudiation
An On-line Electronic Check System with Mutual Authentication (cont.) • Registration phase • Paying phase register User Bank authenticate Shop User Bank
An On-line Electronic Check System with Mutual Authentication (cont.) Registration phase User Bank ID, α s, j Secure channel
An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User k k’ ID, IDbank, a, b, j, s, C1, C2, T
An On-line Electronic Check System with Mutual Authentication (cont.) Paying phase Bank Shop User ID, IDbank, a, b, j, s, C1, C2, T ID, IDbank, a, b, j, s, C1, C2, T
Comparisons • I: Uniqueness • II: Robustness • III: Mutual authentication • IV: Non-repudiation
A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment • Requirements: • Anonymity • Authentication • Low computational cost
A Practical Secure and Efficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment (cont.) Mobile User (MU) Authorization Authority (AA) License Server (LS) Secure channel
Mobile User (MU) Authorization Authority (AA) License Server (LS) : transmitted message
Conclusions and Future Works • Authentication scheme for wireless sensor networks • lower computational cost • security • Authentication scheme for e-check • practicality • security • Authentication scheme for E-DRM • lower computational cost • security
Conclusions and Future Works (cont.) • E-Commerce • Wireless environment • Mobile • VANET • Cloud computing