Visible to the public Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy

TitleAuthentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Publication TypeConference Paper
Year of Publication2018
AuthorsHwang, D., Shin, J., Choi, Y.
Conference Name2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)
Keywordsapplication server, authentication, authentication protocol, authorisation, cryptographic protocols, cryptography, Data collection, handshake protocol, Human Behavior, message authentication, mobile authentication proxy, performance evaluation, Protocols, Prototypes, proxy, pubcrawl, Resiliency, Scalability, secure data transmission, sensitive data, Servers, session key, telecommunication security, TLS handshake protocol, transport layer security handshake protocol, transport protocols, unauthorized wearable devices, Wearable Device, wearables security
AbstractThe data transmitted from the wearable device commonly includes sensitive data. So, application service using the data collected from the unauthorized wearable devices can cause serious problems. Also, it is important to authenticate any wearable device and then, protect the transmitted data between the wearable devices and the application server. In this paper, we propose an authentication protocol, which is designed by using the Transport Layer Security (TLS) handshake protocol combined with a mobile authentication proxy. By using the proposed authentication protocol, we can authenticate the wearable device. And we can secure data transmission since session key is shared between the wearable device and the application server. In addition, the proposed authentication protocol is secure even when the mobile authentication proxy is unreliable.
Citation Keyhwang_authentication_2018