Skip to main content

An Efficient Message-Attached Password Authentication Protocol and Its Applications in the Internet of Things

  • Conference paper
Advances in Computer Science, Environment, Ecoinformatics, and Education (CSEE 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 214))

  • 1775 Accesses

Abstract

Based on the shortcoming of low efficiency of secure message transmission in the Internet of things, a new design philosophy is proposed: combining the authentication with message transmission. Accordingly, a secure and efficient message-attached password authentication protocol is presented. We design universal message transmission architecture of the Internet of things, consisting of clients, server, and network node. As a result, some experiments show that our scheme is efficient and convenient which can solve all the security problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Telecommunication Union (ITU), ITU Internet Reports, The Internet of Things (2005)

    Google Scholar 

  2. European Research Projects on the Internet of Things (CERP-IoT) Strategic Research Agenda (SRA), Internet of Things – Strategic Research Roadmap (2009)

    Google Scholar 

  3. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  4. Lamport, L.: Password Authentication with the Insecure Communication. Communications of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  5. Hwang, J., Yeh, T.: Improvement on Peyravian-Zunic’s Password Authentication Schemes. IEICE Transactions on Communications E85-B(4), 823–825 (2002)

    Google Scholar 

  6. Chun, L., Hwang, T.: A Password Authentication Scheme with Secure Password Updating. Computers & Security 22(1), 68–72 (2003)

    Article  Google Scholar 

  7. Peyravian, M., Jeffries, C.: Secure Remote User Access Over Insecure Networks. Computer Communications 29(5/6), 660–667 (2006)

    Article  Google Scholar 

  8. Wang, B., Zhang, H., Wang, Z., Wang, Y.: A Secure Mutual Password Authentication Scheme with User Anonymity. Geomatics and Information Science of Wuhan University 33(10), 1073–1075 (2008)

    Google Scholar 

  9. Koc, C.K.: Cryptographic Engineering. Springer, Heidelberg (2008)

    Google Scholar 

  10. Google: Google Projects for Android (2010), http://code.google.com/intl/en/android

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, A., Li, Z., Yang, X. (2011). An Efficient Message-Attached Password Authentication Protocol and Its Applications in the Internet of Things. In: Lin, S., Huang, X. (eds) Advances in Computer Science, Environment, Ecoinformatics, and Education. CSEE 2011. Communications in Computer and Information Science, vol 214. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23321-0_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23321-0_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23320-3

  • Online ISBN: 978-3-642-23321-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics