Digital rights management (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders, and individuals to limit the use of digital content and devices. Enterprise digital rights management (E‐DRM) is the application of DRM technology to prevent illegal users from accessing the confidential data of an enterprise. In 2010, Chang et al. proposed an efficient E‐DRM scheme to solve the flaws of Chen's scheme. However, we still found some weaknesses in their scheme. In this article, we propose an improved secure and efficient E‐DRM mechanism based on a one‐way hash function and exclusive‐or. Our mechanism overcomes the weaknesses in the scheme of Chang et al. and also reduces computation costs. In addition, we used BAN logic to show the correctness of our mechanism. Copyright © 2012 John Wiley & Sons, Ltd.
Radio frequency identification (RFID) systems rely on the significant technology of remote, automatic identification with small, low-cost RF elements to complete RF communications securely among all entities. This technology must ensure that secret information or data communicated via radio transmission are not vulnerable to intentional interception, modification for tracing the individual tag holder, or the attachment of any item. With the increase in the number of applications of RFID systems, security and privacy problems have become the focus of significant concern. In this paper, we propose an authenticated RFID security mechanism based on chaotic maps that guarantees a mutually authenticated process and uses a simple and robust chaotic cryptosystem to implement a practical RFID mechanism. The security of the transmitted information and the privacy of personal information or data were our main concerns in the proposed scheme. Also, we have provided detailed information concerning authentication proof and security aspects of our new design. 247 inherent requirements for RFID item hardware, an adaptive transmission mechanism, tag identification qualification, and communication security would have to be solved to the maximum extent possible. Hence, the creation of a novel method for using reasonable cryptographic algorithms must be merged into RFID systems [3,4].Recently, the focus on the popularity, intractable objective, small size, and low-cost characteristics of RFID devices has created more challenges and difficulties for people concerned with this technology area. For instance, RFID system is easily vulnerable to suffer from variable attacks such as impersonation attack, replay attack, and denial-of-service (DoS) attack. Moreover, a personal device appending tag information or data poses potential weaknesses where the tag holder might be exposed to location, constellation, transaction, preference, and breadcrumb threats [5]. Many people have proposed various schemes aimed at the security issues associated with an RFID system, and most such treatments have used vulnerable methods or complicated solutions on the RFID infrastructure. Chein and Chen [6] presented a mutual authentication scheme that has been found to have security issues with DoS attacks [7]. The RFID authentication scheme of Chen et al. [8], which is based on quadratic residues, was proposed to conform to the security requirements. Unfortunately, it was found to be vulnerable to tag impersonation attacks, location violations, and replay attacks [9]. Improvements on the scheme of Chen et al. were proposed by Yeh et al. [9], but the scheme still contained basic cryptography with quadratic residues that inherently were significant structural weaknesses as indicated by previous research [10]. Chen et al. [11] proposed a newly designed strategy of indefinite index and challenge response for the RFID access control protocol. The new strategy utilized a constant secret value to perform the execution, which led to quite a few potential security vulne...
With the popularity of wireless communication, the security of mobile networks becomes more and more important. However, due to the computation limitation, many existing authentication key agreement protocols are not suitable for wireless mobile networks. In 2005, Sui et al. proposed an efficient authentication key agreement protocol, but their protocol can not resist the off-line password guessing attack. Therefore, Lu et al. present an enhanced authentication key agreement protocol to against this attack. However, we find that their protocol can not withstand the parallel guessing attack. Here, we propose an improved authentication key agreement protocol based on elliptic curve for wireless mobile networks that can enhance the security of A-Key distribution protocol in 3GPP2.
Online electronic transactions have become more and more popular in recent years. Electronic cash (e‐cash) has acted an important role, but e‐cash is digital data that can be copied easily, resulting in double spending. To ensure the security and fairness of transactions, researchers designed secure e‐cash payment systems. In 1982, Chaum proposed the first payment scheme using an RSA‐based, blind signature to achieve anonymity. Since then, many studies have been conducted, but most related schemes still have high costs associated with the computations. In this paper, we propose a new, secure, e‐cash payment system using elliptic curve cryptosystem (ECC) and secret sharing combined with cloud computing to provide lower cost than previous systems. Our proposed scheme also can meet the requirements of a well‐designed, secure, e‐cash payment system. Copyright © 2016 John Wiley & Sons, Ltd.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.