SlideShare a Scribd company logo
Efficient Authentication for Mobile and Pervasive 
Computing 
ABSTRACT: 
With today’s technology, many applications rely on the existence of small devices 
that can exchange information and form communication networks. In a significant 
portion of such applications, the confidentiality and integrity of the communicated 
messages are of particular interest. In this work, we propose two novel techniques 
for authenticating short encrypted messages that are directed to meet the 
requirements of mobile and pervasive applications. By taking advantage of the fact 
that the message to be authenticated must also be encrypted, we propose provably 
secure authentication codes that are more efficient than any message authentication 
code in the literature. The key idea behind the proposed techniques is to utilize the 
security that the encryption algorithm can provide to design more efficient 
authentication mechanisms, as opposed to using standalone authentication 
primitives. 
EXISTING SYSTEM: 
A popular class of unconditionally secure authentication is based on universal 
hash-function families, pioneered by Carter and Wegman. Since then, the study of
unconditionally secure message authentication based on universal hash functions 
has been attracting research attention, both from the design and analysis 
standpoints 
DISADVANTAGES OF EXISTING SYSTEM: 
 Unconditionally secure universal hashing-based MACs are considered 
impractical in most modern applications, due to the difficulty of managing 
one-time keys 
PROPOSED SYSTEM: 
 In this paper we propose two new techniques for authenticating short 
encrypted messages that are more efficient than existing approaches. 
 In the first technique, we utilize the fact that the message to be authenticated 
is also encrypted, with any secure encryption algorithm, to append a short 
random string to be used in the authentication process. Since the random 
strings used for different operations are independent, the authentication 
algorithm can benefit from the simplicity of unconditional secure
authentication to allow for faster and more efficient authentication, without 
the difficulty to manage one-time keys. 
 In the second technique, we make the extra assumption that the used 
encryption algorithm is block cipher based to further improve the 
computational efficiency of the first technique. The driving motive behind 
our investigation is that using a general purpose MAC algorithm to 
authenticate exchanged messages in such systems might not be the most 
efficient solution and can lead to waste of resources already available, 
namely, the security that is provided by the encryption algorithm. 
ADVANTAGES OF PROPOSED SYSTEM: 
 More efficient than existing approaches. 
 The authentication algorithm can benefit from the simplicity of 
unconditional secure authentication to allow for faster and more efficient 
authentication, without the difficulty to manage one-time keys. 
 The most efficient solution and can lead to waste of resources already 
available, namely, the security that is provided by the encryption algorithm.
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Basel Alomair,and Radha Poovendran, “Efficient Authentication for Mobile and 
Pervasive Computing”, IEEE TRANSACTIONS ON MOBILE COMPUTING, 
VOL. 13, NO. 3, MARCH 2014

More Related Content

DOCX
efficient authentication for mobile and pervasive computing
PPTX
Efficient authentication for mobile and pervasive computing
DOCX
A lightweight secure scheme for detecting
DOCX
efficient and privacy aware data aggregation in mobile sensing
PPT
PPT FOR IDBSDDS SCHEMES
DOCX
certificate less remote anonymous authentication schemes for wireless body ar...
PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
DOC
Lightweight secure scheme for detecting provenance forgery and packet drop at...
efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
A lightweight secure scheme for detecting
efficient and privacy aware data aggregation in mobile sensing
PPT FOR IDBSDDS SCHEMES
certificate less remote anonymous authentication schemes for wireless body ar...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
Lightweight secure scheme for detecting provenance forgery and packet drop at...

What's hot (20)

PDF
A lightweight secure scheme for detecting provenance forgery and packet drop ...
PPTX
project 11
PPTX
Authentication on Cloud using Attribute Based Encryption
DOCX
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
PDF
Research
PDF
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
DOCX
message passing interface
PDF
a famework for analyzing template security and privacy in biometric authenti...
PDF
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
PDF
Ijcatr04051002
PDF
2.espk external agent authentication and session key establishment using publ...
DOCX
Attribute based access to scalable media in cloud-assisted content sharing ne...
PDF
A secure and efficient id based aggregate signature scheme for wireless senso...
PDF
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
PDF
Enhancing the Techniques to Secure Grid Computing
DOCX
Securing broker less publish subscribe systems using identity-based encryption
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
PPTX
Distance-bounding facing both mafia and distance frauds
PPTX
Securing broker less publish subscribe systems using identity-based encryption
A lightweight secure scheme for detecting provenance forgery and packet drop ...
project 11
Authentication on Cloud using Attribute Based Encryption
JPJ1429 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Research
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
message passing interface
a famework for analyzing template security and privacy in biometric authenti...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
Ijcatr04051002
2.espk external agent authentication and session key establishment using publ...
Attribute based access to scalable media in cloud-assisted content sharing ne...
A secure and efficient id based aggregate signature scheme for wireless senso...
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
Enhancing the Techniques to Secure Grid Computing
Securing broker less publish subscribe systems using identity-based encryption
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Distance-bounding facing both mafia and distance frauds
Securing broker less publish subscribe systems using identity-based encryption
Ad

Similar to JPJ1449 Efficient Authentication for Mobile and Pervasive Computing (20)

PPTX
Efficient authentication for mobile and pervasive computing
DOCX
Efficient authentication for mobile and pervasive computing
PDF
An Efficient privacy preserving for Mobile and Pervasive Computing
PDF
Efficient authentication for mobile and pervasive computing
PDF
A Review Study on Secure Authentication in Mobile System
PPTX
final review PPT.pptx
PDF
Two aspect authentication system using secure
PDF
Two aspect authentication system using secure
DOCX
GRAPHICAL PASSWORD SUFFLELING 2222222222
DOC
graphical password authentical using machine learning document
PDF
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
PDF
Two aspect authentication system using secure mobile
PDF
Two aspect authentication system using secure mobile devices
PDF
Psdot 19 four factor password authentication
PDF
Psdot 6 web based security analysis of opass authentication schemes using mob...
PDF
HMAC SHA 256- PROPOSED AUTHENTICATION ALGORITHM-PRINCE DUAH MENSAH-MPhil IT (...
DOC
87559489 auth
PPTX
zzzzzzzz
PDF
Adaptive authentication to determine login attempt penalty from multiple inpu...
PDF
Adaptive authentication to determine login attempt penalty from multiple inpu...
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
An Efficient privacy preserving for Mobile and Pervasive Computing
Efficient authentication for mobile and pervasive computing
A Review Study on Secure Authentication in Mobile System
final review PPT.pptx
Two aspect authentication system using secure
Two aspect authentication system using secure
GRAPHICAL PASSWORD SUFFLELING 2222222222
graphical password authentical using machine learning document
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobile devices
Psdot 19 four factor password authentication
Psdot 6 web based security analysis of opass authentication schemes using mob...
HMAC SHA 256- PROPOSED AUTHENTICATION ALGORITHM-PRINCE DUAH MENSAH-MPhil IT (...
87559489 auth
zzzzzzzz
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
Ad

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
DOCX
JPN1423 Stars a Statistical Traffic Pattern
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPN1423 Stars a Statistical Traffic Pattern
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification

Recently uploaded (20)

PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
composite construction of structures.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
PPT on Performance Review to get promotions
PPTX
Geodesy 1.pptx...............................................
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
additive manufacturing of ss316l using mig welding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
CH1 Production IntroductoryConcepts.pptx
composite construction of structures.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Foundation to blockchain - A guide to Blockchain Tech
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT on Performance Review to get promotions
Geodesy 1.pptx...............................................
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Operating System & Kernel Study Guide-1 - converted.pdf
additive manufacturing of ss316l using mig welding

JPJ1449 Efficient Authentication for Mobile and Pervasive Computing

  • 1. Efficient Authentication for Mobile and Pervasive Computing ABSTRACT: With today’s technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, we propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, we propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives. EXISTING SYSTEM: A popular class of unconditionally secure authentication is based on universal hash-function families, pioneered by Carter and Wegman. Since then, the study of
  • 2. unconditionally secure message authentication based on universal hash functions has been attracting research attention, both from the design and analysis standpoints DISADVANTAGES OF EXISTING SYSTEM:  Unconditionally secure universal hashing-based MACs are considered impractical in most modern applications, due to the difficulty of managing one-time keys PROPOSED SYSTEM:  In this paper we propose two new techniques for authenticating short encrypted messages that are more efficient than existing approaches.  In the first technique, we utilize the fact that the message to be authenticated is also encrypted, with any secure encryption algorithm, to append a short random string to be used in the authentication process. Since the random strings used for different operations are independent, the authentication algorithm can benefit from the simplicity of unconditional secure
  • 3. authentication to allow for faster and more efficient authentication, without the difficulty to manage one-time keys.  In the second technique, we make the extra assumption that the used encryption algorithm is block cipher based to further improve the computational efficiency of the first technique. The driving motive behind our investigation is that using a general purpose MAC algorithm to authenticate exchanged messages in such systems might not be the most efficient solution and can lead to waste of resources already available, namely, the security that is provided by the encryption algorithm. ADVANTAGES OF PROPOSED SYSTEM:  More efficient than existing approaches.  The authentication algorithm can benefit from the simplicity of unconditional secure authentication to allow for faster and more efficient authentication, without the difficulty to manage one-time keys.  The most efficient solution and can lead to waste of resources already available, namely, the security that is provided by the encryption algorithm.
  • 4. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE
  • 5.  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Basel Alomair,and Radha Poovendran, “Efficient Authentication for Mobile and Pervasive Computing”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014