By Topic

A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)

In a smart living environment, a person can use various intelligent devices to obtain his desired services at any time and any place. For convenience, most of these devices are small and of limited power and computation capacity. Therefore, an admired protocol should take these into consideration. In particular, identification and key agreement are basic mechanisms when a user wants to get a secure service from a server over the public networks. However, if the user's identity is transmitted in a plaintext, an adversary can intercept the information and use it to launch some attacks. In this paper, we propose a key agreement protocol with user anonymity based on elliptic curve discrete logarithm problem. In our protocol, the storage and computation costs are very low and the server does not maintain a password file for identifying the users. Therefore, our protocol is suitable for applying ubiquitous computing environments.

Published in:

Multimedia and Ubiquitous Engineering, 2007. MUE '07. International Conference on

Date of Conference:

26-28 April 2007