A Novel Approach to Many-to-Many User Authentication in Different Information Systems
Modelirovanie i analiz informacionnyh sistem, Tome 20 (2013) no. 4, pp. 91-103.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this paper, we propose a novel approach to many-to-many user authentication in heterogeneous information systems. The described solution is based on the use of wireless keys – special devices that identify the user by transmitting the requested key information over a wireless network. The key feature of the proposed approach is noninteractive operating mode that allows to use a special encryption algorithm instead of two-way authentication. The algorithm is built on the basis of existing cryptographic primitives that prevents unauthorized system participants from getting access to the data of other users, even with physical access to the memory of the key. This approach does not require computational power or the battery on the key side and does not involve the user in the authentication process that allows implementing a method on passive NFC tags. To proof the concept, software implementation of the described system was developed and a qualitative comparison of the resulting solutions with existing analogues was conducted.
Keywords: authentication, wireless networking, information systems security.
@article{MAIS_2013_20_4_a6,
     author = {Vitaly Petrov and Maria Komar and Yevgeny Koucheryavy},
     title = {A {Novel} {Approach} to {Many-to-Many} {User} {Authentication} in {Different} {Information} {Systems}},
     journal = {Modelirovanie i analiz informacionnyh sistem},
     pages = {91--103},
     publisher = {mathdoc},
     volume = {20},
     number = {4},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/}
}
TY  - JOUR
AU  - Vitaly Petrov
AU  - Maria Komar
AU  - Yevgeny Koucheryavy
TI  - A Novel Approach to Many-to-Many User Authentication in Different Information Systems
JO  - Modelirovanie i analiz informacionnyh sistem
PY  - 2013
SP  - 91
EP  - 103
VL  - 20
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/
LA  - ru
ID  - MAIS_2013_20_4_a6
ER  - 
%0 Journal Article
%A Vitaly Petrov
%A Maria Komar
%A Yevgeny Koucheryavy
%T A Novel Approach to Many-to-Many User Authentication in Different Information Systems
%J Modelirovanie i analiz informacionnyh sistem
%D 2013
%P 91-103
%V 20
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/
%G ru
%F MAIS_2013_20_4_a6
Vitaly Petrov; Maria Komar; Yevgeny Koucheryavy. A Novel Approach to Many-to-Many User Authentication in Different Information Systems. Modelirovanie i analiz informacionnyh sistem, Tome 20 (2013) no. 4, pp. 91-103. http://geodesic.mathdoc.fr/item/MAIS_2013_20_4_a6/

[1] Dan Griffin, “Safer Authentication with a One–Time Password Solution”, MSDN, 5 (2008)

[2] PIN-kod PLAS No 122, 2007

[3] Tsifrovoi sertifikat www.authority.ru/scdp/page?als=504349

[4] Kriptograficheskii token www.rsa.com/rsalabs/node.asp?id=2133

[5] Biometrics research Group — What is biometrics?, http://biometrics.cse.msu.edu/info/index.html

[6] R. Biddle, S. Chiasson, P. C. van Oorschot, Graphical Passwords: Learning from Fisrt Generation, Technical Report TR-09-09, School of Computer Science, Carleton University, Ottawa, Canada, 2009

[7] Besprovodnoi klyuch ot PK http://www.rohos.ru/2011/05/security-performances-with-wireless-pc-lock/

[8] M. Komar, Zaschischennoe khranilische dokumentov, vypusknaya kvalifikatsionnaya rabota bakalavra, Yaroslavl, 2013

[9] Vitaly Petrov, Maria Komar, Yevgeni Koucheryavy, “A Lightweight Many-to-Many Authentication Protocol for Near Field Communications”, 21st IEEE International Conference on Network Protocols (Goettingen, Germany, 2013)

[10] Google Inc. — Google Wallet www.google.com/wallet/26.05.2011

[11] Apple iWallet www.patentlyapple.com/patently-apple/tech-nfc/11.06.2013

[12] codeREADr project www.codereadr.com/2009-2013

[13] Universalnaya elektronnaya karta http://www.uecard.ru/2010–2013

[14] VeriChip www.positiveidcorp.com/2013

[15] Single point of failure www.techopedia.com/definition/4351/single-point-of-failure-spof

[16] Kerberos: The Network Authentication Protocol http://web.mit.edu/kerberos/

[17] GOST R ISO/MEK 17799-2005 (in Russian)

[18] Terekhov A. N., Tiskin A. V., “Kriptografiya s otkrytym klyuchom: ot teorii k standartu”, Programmirovanie, 1994, no. 5, 17–22 (in Russian)

[19] Advanced Encryption Standard csrc.nist.gov/publications/fips/fips197/fips-197.pdf

[20] Xuejia Lai, James Massey, “A Proposal for a New Block Encryption Standard”, EUROCRYPT'90, 1990 | MR

[21] WiFi Alliance http://www.wi-fi.org/

[22] Wireless USB Specification http://www.businesswire.com/news/home/20100929005516/en/Wireless-USB-1.1-Specification