RUS  ENG
Full version
JOURNALS // Computing, Telecommunication and Control // Archive

St. Petersburg Polytechnical University Journal. Computer Science. Telecommunication and Control Sys, 2017 Volume 10, Issue 4, Pages 29–40 (Mi ntitu190)

Telecommunication Systems and Computer Networks

Authenticating electronic devices for temporary use: access rights management protocol

A. Ya. Ometova, S. V. Bezzateevb, E. A. Koucheryavyc

a St. Petersburg State University of Telecommunications
b St. Petersburg National Research University of Information Technologies, Mechanics and Optics
c Moscow Institute of Electronics and Mathematics — Higher School of Economics

Abstract: The number of active wearable devices per user is growing daily. Conventionally, authentication algorithms were responsible for the security of such systems especially in terms of the Internet of Things (IoT) paradigm. This manuscript proposes an authentication protocol specifically designed for operation under unreliable connectivity to trusted authority constraints. Such situations may occur both in cases of network overload and in distant areas with low network coverage. The summary on existing solutions as well as the benefits brought by the solution are discussed. A detailed description of the protocol execution phases enabling integrity and privacy for the owner and the temporary user is also given.

Keywords: authentication, protocol, Internet of Things, wireless communication, unreliable connection.

UDC: 004.021

DOI: 10.18721/JCSTCS.10403



© Steklov Math. Inst. of RAS, 2024