Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging

The implementation of countermeasures to avoid licence abuse is now obligatory, especially with the burgeoning of the Internet. The protocol proposed here is implemented within the session initiation protocol (SIP); this has been selected as the official end‐to‐end signalling protocol for establishi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematical methods in the applied sciences 2018-04, Vol.41 (6), p.2319-2327
Hauptverfasser: Alvarez‐Bermejo, José Antonio, Lopez‐Ramos, Juan Antonio
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The implementation of countermeasures to avoid licence abuse is now obligatory, especially with the burgeoning of the Internet. The protocol proposed here is implemented within the session initiation protocol (SIP); this has been selected as the official end‐to‐end signalling protocol for establishing multimedia sessions in the Universal Mobile Telecommunication Systems network. This paper introduces blind signatures, enforced with user‐specific and unique data, modelled from CCD sensors to trace users of these online services, thus avoiding licence sharing that gives access to them. Blind signatures are useful in providing anonymity and establishing a way to tag users. The proposed protocol takes advantage of elliptic curve‐based cryptosystems – smaller key sizes and lower computational resources, an interesting issue for session establishment in S‐Universal Mobile Telecommunication Systems (satellite‐linked networks), where fast and light authentication protocols are a requirement ideal. SIP is a powerful signalling protocol for transmitting media over Internet protocol. Authentication is a vital security requirement for SIP. Hitherto, many authentication schemes have been proposed to enhance SIP security; indeed, the problem of impersonation is one of the topics most discussed. Consequently, a novel authentication and key agreement scheme is proposed for SIP using an elliptic curve cryptosystem. Copyright © 2016 John Wiley & Sons, Ltd.
ISSN:0170-4214
1099-1476
DOI:10.1002/mma.4259