Trust-based authentication scheme with user rating for low-resource devices in smart environments

被引:5
|
作者
El Husseini, Anas [1 ,2 ]
M'Hamed, Abdallah [1 ]
El Hassan, Bachar [2 ]
Mokhtari, Mounir [1 ]
机构
[1] Telecom SudParis, Handicom Lab, Evry, France
[2] Lebanese Univ, Azm Ctr Sci Res, LaSTRe Lab, Tripoli, Lebanon
关键词
Smart environments; Privacy preservation; Trust evaluation; Authentication; Low-resource devices; MODEL;
D O I
10.1007/s00779-012-0548-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In smart environments, pervasive computing contributes in improving daily life activities for dependent people by providing personalized services. Nevertheless, those environments do not guarantee a satisfactory level for protecting the user privacy and ensuring the trust between communicating entities. In this study, we propose a trust evaluation model based on user past and present behavior. This model is associated with a lightweight authentication key agreement protocol (Elliptic Curve-based Simple Authentication Key Agreement). The aim is to enable the communicating entities to establish a level of trust and then succeed in a mutual authentication using a scheme suitable for low-resource devices in smart environments. An innovation in our trust model is that it uses an accurate approach to calculate trust in different situations and includes a human-based feature for trust feedback, which is user rating. Finally, we tested and implemented our scheme on Android mobile phones in a smart environment dedicated for handicapped people.
引用
收藏
页码:1013 / 1023
页数:11
相关论文
共 50 条
  • [21] NomadiKey: User authentication for smart devices based on nomadic keys
    Souza, Artur
    Cunha, Italo
    Oliveira, Leonardo B.
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [22] NomadiKey: User Authentication for Smart Devices based on Nomadic Keys
    Cotta, Leonardo
    Fernandes, Artur Luis
    Melo, Leandro T. C.
    Saggioro, Luiz Felipe Z.
    Martins, Frederico
    Neto, Antonio L. Maia
    Loureiro, Antonio A. F.
    Cunha, Italo
    Oliveira, Leonardo B.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [23] Robust smart-cards-based user authentication scheme with user anonymity
    Wu, Shuhua
    Zhu, Yuefei
    Pu, Qiong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 236 - 248
  • [24] A Rhythm-Based Authentication Scheme for Smart Media Devices
    Lee, Jae Dong
    Jeong, Young-Sik
    Park, Jong Hyuk
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [25] Efficient mCoupon Authentication Scheme for Smart Poster Environments based on Low-cost NFC
    Park, Sung-Wook
    Lee, Im-Yeong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 131 - 138
  • [26] Blockchain-based trust management and authentication of devices in smart grid
    Dehalwar, Vasudev
    Kolhe, Mohan Lal
    Deoli, Shreya
    Jhariya, Mahendra Kumar
    CLEANER ENGINEERING AND TECHNOLOGY, 2022, 8
  • [27] A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
    Li, Xiong
    Ma, Jian
    Wang, Wendong
    Xiong, Yongping
    Zhang, Junsong
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 85 - 95
  • [28] Features and Impact of Trust-Based Relationships Between Community Health Workers and Low-Resource Perinatal Women with Chronic Health Conditions
    Lisa M. Boyd
    Renee Mehra
    Jordan Thomas
    Jessica B. Lewis
    Shayna D. Cunningham
    Maternal and Child Health Journal, 2021, 25 : 1866 - 1874
  • [29] An enhanced smart card based remote user password authentication scheme
    Li, Xiong
    Niu, Jianwei
    Khan, Muhammad Khurram
    Liao, Junguo
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) : 1365 - 1371
  • [30] An Improved Timestamp-Based User Authentication Scheme with Smart Card
    Feng, Tung-Huang
    Ling, Chung-Huei
    Hwang, Min-Shiang
    INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 111 - 117