A Self-Concealing Mechanism for Authentication of Portable Communication Systems

Download Now
Provided by: International Journal of Network Security
Topic: Security
Format: PDF
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove the users identity via a secret shared key. However, this implies that the server requires secure storage and organization of a bulky database for the shared keys of all users. Evidently, such a sensitive and large database increases both maintenance loading and security concerns due to malicious intruders. In this paper, a self-concealing mechanism was invented which allows to discard the bulky database and create valuable improvements for portable communication systems.
Download Now

Find By Topic