Font Size: a A A

Research On Authentication Framework And Authentication Schemes In Wearable-Devices Environment

Posted on:2016-07-11Degree:MasterType:Thesis
Country:ChinaCandidate:S LiuFull Text:PDF
GTID:2308330479989211Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As wearable devices start to step into people’s daily life, they are bringing a number of changes to people’s lifestyle and habits. Due to their limited processing ability, wearable devices need to coordinate with other mobile devices to deal with users’ private data. Therefore, how to achieve secure mutual authentication between wearable devices and mobile devices is a key point to promote the development of wearable devices and secure the users’ privacy.In view of this, this paper has studied some authentication issues in wearable-devices environment, the research results are as follows:First of all, this paper proposes an authentication framework for the first time in this field. In this authentication model, the user and wearable devices, or the user and mobile devices, both of them are one-way authentication; there is a two-way authentication process for devices themselves.Then this paper proposes a authentication protocol(DLSD protocol) and challenge-response protocol in wearable-devices environment. It has adopted three different communication channels, namely, common channel, visual OOB channel and user channel. Meanwhile, it also considers the users’ rights management and divides the users into main user and sub-users.Finally, this paper conducts the analysis of DLSD protocol and implement a specific device simulation. This paper analyzes the security features of this protocol, and then proves that it meets the security requirements and it can resist current known attacks. Besides, through the usability analysis of some similar schemes, it can be concluded that this protocol is the most practical solution. Also, this paper simulates the wearable devices with cell phones. Through the experimental data analysis, it can be demonstrated that practical application of the protocol meets expectations.
Keywords/Search Tags:Wearable-Devices Environment, Wearable Devices, Mobile Devices, Authentication Protocols
PDF Full Text Request
Related items