Fast Proxy Authentication
Keywords: Fast Proxy Authentication, 5G, Internet of Things, Bacteria-Inspired Communication, Secret Sharing, Fault Tolerance

Hsin-Nan Kuo1 , Yu-Tse Shih2 , Er-Shuo Zhuang3 , Jheng-Jia Huang4 , and Chun-I Fan5*

1, 2, 3, 5Department of Computer Science and Engineering, National Sun Yat-sen University
4,5 Telecom Technology Center
5 Information Security Research Center, National Sun Yat-sen University
5 Intelligent Electronic Commerce Research Center, National Sun Yat-sen University
1 This email address is being protected from spambots. You need JavaScript enabled to view it.2 This email address is being protected from spambots. You need JavaScript enabled to view it.3 This email address is being protected from spambots. You need JavaScript enabled to view it.4 This email address is being protected from spambots. You need JavaScript enabled to view it.5 This email address is being protected from spambots. You need JavaScript enabled to view it.



Abstract

Due to the rapid development of information technology, the demand for Internet services has gradually increased. With the advancement of the mobile telecommunications industry, people have relatively high expectations for the improvement of Internet speed and performance. Therefore, voice transmission technology must keep up with the speed of evolution. This evolution process is from 2G network that originally provided the data service business and can only satisfy the simple communication, SMS, and single function of the Internet, to the 3G network that can be processed in the multimedia form. In addition, to meet users' demand for wireless services and higher-speed voice calls, the mobile broadband network of 4G LTE has also evolved, and telecommunications providers further research into 5G networks with greater bandwidth and higher performance. However, the recent booming in IoT (Internet of Things) has also raised people's high dependence on information transmission, which has placed a heavy burden on the 5G network environment. For this concern, this paper combines the concept of Bacteria-inspired network with the feature that multiple devices can communicate with each other in the IoT environment, so that we can construct an environment with fast proxy authentications and a trustworthy file encryption protocol. The data transmission is no longer limited to having to pass through the base station, instead, the user can select the path for transmitting to be transmitted. However, each user must be legally authenticated with the base station in the 5G network environment, and it is difficult to prevent the malicious nodes in the transmission or the malicious behavior of specific people, so there are some worries about the security problems and performance. In response to this problem, this paper combined the concept of outsourcing computing with blind processing in the above project and built a set of outsourcing authentication mechanisms with both lightweight and blind data features, so that each device can transmit information to each other through a secure diffusion transmission pipeline, and we can ensure that the transmission node and data source are legitimate at the same time. Following the above results, our project can effectively reduce the burden on the base station to calculate and transmit information by ciphertext cutting, recombination and integration technologies with threshold fault tolerance. It is expected that the purpose of transmitting the information efficiently can be achieved and the overall service quality of the network environment will be improved.



References

  1. R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, “Controlling data inthe cloud: outsourcing computation without outsourcing control,” in Proc. of the 2009 ACM workshopon Cloud computing security. ACM, pp. 85-90, November 13, 2009 Google Scholar
  2. A. Yao, "Protocols for secure computations." In Proceedings of the IEEE Symposium on Foundationsof Computer Science, pp. 160-164, 1982. Google Scholar
  3. A. Yao, "How to generate and exchange secrets." In Proceedings of the IEEE Symposium onFoundations of Computer Science, pp. 162-167, 1986. Google Scholar
  4. Chow, and Richard, “Controlling data in the cloud: outsourcing computation without outsourcing control.” Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009. Google Scholar
  5. Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612- 613.  Google Scholar
  6. Blakley, George Robert. "Safeguarding cryptographic keys." Proceedings of the national computer conference. Vol. 48. 1979.Google Scholar
  7. Castro, Miguel, and Barbara Liskov. "Practical Byzantine fault tolerance." OSDI. Vol. 99. 1999. Google Scholar
  8. Castro, Miguel, and Barbara Liskov. "Practical Byzantine fault tolerance and proactive recovery." ACM Transactions on Computer Systems (TOCS) 20.4 (2002): 398-461. Google Scholar
  9. Tsai, Jia Lun. "Efficient Nonce-based Authentication Scheme for Session Initiation Protocol." IJ Network Security 9.1 (2009): 12-16. Google Scholar
  10. Chuang, Ming-Chin, and Meng Chang Chen. "An anonymous multi-server authenticated keyagreement scheme based on trust computing using smart cards and biometrics." Expert Systems with Applications 41.4 (2014): 1411-1418.Google Scholar

For more information about this article, please contact us here