TUTCRIS - Tampereen teknillinen yliopisto

TUTCRIS

A lightweight many-to-many authentication protocol for near field communications

Tutkimustuotosvertaisarvioitu

Standard

A lightweight many-to-many authentication protocol for near field communications. / Petrov, Vitaly; Komar, Maria; Koucheryavy, Yevgeni.

Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE COMPUTER SOCIETY PRESS, 2013. 6733633.

Tutkimustuotosvertaisarvioitu

Harvard

Petrov, V, Komar, M & Koucheryavy, Y 2013, A lightweight many-to-many authentication protocol for near field communications. julkaisussa Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013., 6733633, IEEE COMPUTER SOCIETY PRESS, Gottingen, Saksa, 7/10/13. https://doi.org/10.1109/ICNP.2013.6733633

APA

Petrov, V., Komar, M., & Koucheryavy, Y. (2013). A lightweight many-to-many authentication protocol for near field communications. teoksessa Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013 [6733633] IEEE COMPUTER SOCIETY PRESS. https://doi.org/10.1109/ICNP.2013.6733633

Vancouver

Petrov V, Komar M, Koucheryavy Y. A lightweight many-to-many authentication protocol for near field communications. julkaisussa Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE COMPUTER SOCIETY PRESS. 2013. 6733633 https://doi.org/10.1109/ICNP.2013.6733633

Author

Petrov, Vitaly ; Komar, Maria ; Koucheryavy, Yevgeni. / A lightweight many-to-many authentication protocol for near field communications. Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013. IEEE COMPUTER SOCIETY PRESS, 2013.

Bibtex - Lataa

@inproceedings{e8a55691995e4f67b949d3d911e2aa71,
title = "A lightweight many-to-many authentication protocol for near field communications",
abstract = "In this paper the lightweight many-to-many authentication protocol, that uses Near Field Communications as a carrier technology is proposed. The solution works without any user interaction and can be applied for almost any data storage device: NFC or RFID tag, USB-flash drive, etc. The major novelty of the system is real-time encryption key generation algorithm. This approach doesn't require any computation power on the tag, trusted third parties or secure link between tag and information system. So far, the mentioned features transforms to significant advantages of the proposed solution, while compared to existing analogues: OAuth, Opacity and LMAP. At the same time, the integrity of key sequences is not guarantied, that brings motivation for future research in the field.",
author = "Vitaly Petrov and Maria Komar and Yevgeni Koucheryavy",
year = "2013",
doi = "10.1109/ICNP.2013.6733633",
language = "English",
isbn = "9781479912704",
booktitle = "Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013",
publisher = "IEEE COMPUTER SOCIETY PRESS",

}

RIS (suitable for import to EndNote) - Lataa

TY - GEN

T1 - A lightweight many-to-many authentication protocol for near field communications

AU - Petrov, Vitaly

AU - Komar, Maria

AU - Koucheryavy, Yevgeni

PY - 2013

Y1 - 2013

N2 - In this paper the lightweight many-to-many authentication protocol, that uses Near Field Communications as a carrier technology is proposed. The solution works without any user interaction and can be applied for almost any data storage device: NFC or RFID tag, USB-flash drive, etc. The major novelty of the system is real-time encryption key generation algorithm. This approach doesn't require any computation power on the tag, trusted third parties or secure link between tag and information system. So far, the mentioned features transforms to significant advantages of the proposed solution, while compared to existing analogues: OAuth, Opacity and LMAP. At the same time, the integrity of key sequences is not guarantied, that brings motivation for future research in the field.

AB - In this paper the lightweight many-to-many authentication protocol, that uses Near Field Communications as a carrier technology is proposed. The solution works without any user interaction and can be applied for almost any data storage device: NFC or RFID tag, USB-flash drive, etc. The major novelty of the system is real-time encryption key generation algorithm. This approach doesn't require any computation power on the tag, trusted third parties or secure link between tag and information system. So far, the mentioned features transforms to significant advantages of the proposed solution, while compared to existing analogues: OAuth, Opacity and LMAP. At the same time, the integrity of key sequences is not guarantied, that brings motivation for future research in the field.

UR - http://www.scopus.com/inward/record.url?scp=84896795715&partnerID=8YFLogxK

U2 - 10.1109/ICNP.2013.6733633

DO - 10.1109/ICNP.2013.6733633

M3 - Conference contribution

SN - 9781479912704

BT - Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013

PB - IEEE COMPUTER SOCIETY PRESS

ER -