Skip to main content

Lightweight Authentication for Distributed Mobile P2P Communications

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 612))

  • 1772 Accesses

Abstract

Peer-to-Peer (P2P) service has gained a great popularity for content sharing among distributed users. Even if it brings a lot of attraction as a good content distribution method, security becomes a very critical issue because a service user needs to communicate with the other persons who could be untrustworthy. Traditional authentication mechanisms usually adopted public key mechanisms, and they are heavy and time consuming. Because of the randomness and mobility of mobile P2P service, the authentication should be lightweight and dynamic. In our work, we propose a mechanism based on visual cryptography and steganography for the mutual authentication between two users for P2P service, and for the P2P multicast service authentication. Our proposed authentication mechanism is lightweight and efficient because it is based on users’ vision by adopting visual cryptography and steganography, and most computation for image generation is only concentrated on authentication server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. An, J., Lee, J., Kim, A., Lee, S.: User Authentication Scheme for Mobile Banking using Visual Cryptography. Korea Computer Congress (2013)

    Google Scholar 

  2. Ghanea-Hercock, R.: Authentication with P2P agents. BT Technol. J. 21(4), 146–152 (2003)

    Article  MATH  Google Scholar 

  3. Kreitz, G., Bodriagov, O., Greschbach, B., RodrĂ­guez-Cano, G., Buchegger, S.: Passwords in peer-to-peer. In: IEEE 12th International Conference on Peer-to-Peer Computing (P2P) (2012)

    Google Scholar 

  4. Lim, J., Doh, I., Chae, K.: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (2016)

    Google Scholar 

  5. Mondal, A. Madria. S.K., Kitsuregawa, M.: CLEAR: an efficient context and location-based dynamic replication scheme for mobile-P2P networks. In: International Conference on Database and Expert Systems Applications (2006)

    Google Scholar 

  6. Mowla, N., Doh, I., Chae, K.: An efficient defense mechanism for spoofed IP attack in SDN based CDNi. In: International Conference on Information Networking (2015)

    Google Scholar 

  7. Song, S., Hwang, K., Zhou, R., Kwok, Y.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput. 9(6), 24–34 (2005)

    Article  Google Scholar 

  8. Takeda, A., Chakraborty, D., Kitagata, G., Hashimoto, K., Shiratori, N.: A new scalable distributed authentication for P2P network and its performance evaluation. In: 12th WSEAS International Conference on COMPUTERS (2008)

    Google Scholar 

  9. Xu, H., Wang, S., Wand, R., Wang, Z.: Efficient P2P-based mutual authentication protocol for RFID system security of EPC network using asymmetric encryption algorithm. J. China Univ. Posts Telecommun. 18(Suppl. 1), 40–47 (2011)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (NRF-2016R1A2B4015899).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Inshil Doh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Lim, J., Doh, I., Chae, K. (2018). Lightweight Authentication for Distributed Mobile P2P Communications. In: Barolli, L., Enokido, T. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2017. Advances in Intelligent Systems and Computing, vol 612. Springer, Cham. https://doi.org/10.1007/978-3-319-61542-4_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61542-4_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61541-7

  • Online ISBN: 978-3-319-61542-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics