Publication detail

Light-weight Mutual Authentication with Non-repudiation

ČLUPEK, V. ZEMAN, V. DZURENDA, P.

Original Title

Light-weight Mutual Authentication with Non-repudiation

English Title

Light-weight Mutual Authentication with Non-repudiation

Type

journal article

Language

en

Original Abstract

In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events. The protocol is simple and suitable for implementation on low-cost devices. Non-repudiation of realized events is achieved by involving a Trusted Third Party (TTP) to the communication. The proposed protocol uses only an appropriate lightweight hash function and pre-shared secret data. Security of the proposed protocol was verified by the BAN (Burrows-Abadi-Needham) logic.

English abstract

In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events. The protocol is simple and suitable for implementation on low-cost devices. Non-repudiation of realized events is achieved by involving a Trusted Third Party (TTP) to the communication. The proposed protocol uses only an appropriate lightweight hash function and pre-shared secret data. Security of the proposed protocol was verified by the BAN (Burrows-Abadi-Needham) logic.

Keywords

Light-weight mutual authentication, hash functions, non-repudiation, Trusted Third Party, Internet of Things.

Released

01.04.2018

Pages from

143

Pages to

150

Pages count

8

BibTex


@article{BUT141300,
  author="Vlastimil {Člupek} and Václav {Zeman} and Petr {Dzurenda}",
  title="Light-weight Mutual Authentication with Non-repudiation",
  annote="In this paper, we focused on a problem of authentication on low-cost devices. We have proposed a new light-weight protocol for mutual authentication of communication entities with non-repudiation of realized events. The protocol is simple and suitable for implementation on low-cost devices. Non-repudiation of realized events is achieved by involving a Trusted Third Party (TTP) to the communication. The proposed protocol uses only an appropriate lightweight hash function and pre-shared secret data. Security of the proposed protocol was verified by the BAN (Burrows-Abadi-Needham) logic.",
  chapter="141300",
  doi="10.13164/re.2018.0143",
  howpublished="online",
  number="1",
  volume="27",
  year="2018",
  month="april",
  pages="143--150",
  type="journal article"
}