Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging

The implementation of countermeasures to avoid licence abuse is now obligatory, especially with the burgeoning of the Internet. The protocol proposed here is implemented within the session initiation protocol (SIP); this has been selected as the official end‐to‐end signalling protocol for establishi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematical methods in the applied sciences 2018-04, Vol.41 (6), p.2319-2327
Hauptverfasser: Alvarez‐Bermejo, José Antonio, Lopez‐Ramos, Juan Antonio
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2327
container_issue 6
container_start_page 2319
container_title Mathematical methods in the applied sciences
container_volume 41
creator Alvarez‐Bermejo, José Antonio
Lopez‐Ramos, Juan Antonio
description The implementation of countermeasures to avoid licence abuse is now obligatory, especially with the burgeoning of the Internet. The protocol proposed here is implemented within the session initiation protocol (SIP); this has been selected as the official end‐to‐end signalling protocol for establishing multimedia sessions in the Universal Mobile Telecommunication Systems network. This paper introduces blind signatures, enforced with user‐specific and unique data, modelled from CCD sensors to trace users of these online services, thus avoiding licence sharing that gives access to them. Blind signatures are useful in providing anonymity and establishing a way to tag users. The proposed protocol takes advantage of elliptic curve‐based cryptosystems – smaller key sizes and lower computational resources, an interesting issue for session establishment in S‐Universal Mobile Telecommunication Systems (satellite‐linked networks), where fast and light authentication protocols are a requirement ideal. SIP is a powerful signalling protocol for transmitting media over Internet protocol. Authentication is a vital security requirement for SIP. Hitherto, many authentication schemes have been proposed to enhance SIP security; indeed, the problem of impersonation is one of the topics most discussed. Consequently, a novel authentication and key agreement scheme is proposed for SIP using an elliptic curve cryptosystem. Copyright © 2016 John Wiley & Sons, Ltd.
doi_str_mv 10.1002/mma.4259
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2013873709</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2013873709</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2889-40a3fe0ea482cbe6058423ceb2212f2b0b0dbda5fc0f656ea3e1094687912b5f3</originalsourceid><addsrcrecordid>eNp10E1LAzEQBuAgCtYq-BMCXrxsnWSzX8e61g9o8aJHCdndZE3ZJjXJVvrvTa1XYWAuD-8wL0LXBGYEgN5tNmLGaFadoAmBqkoIK_JTNAFSQMIoYefowvs1AJSE0An6uB-06bDXvRFhdNLj0WvT40H3nwHvhNMiaGs81gbX9QP20njrPBZx8FaEIJ3BwWKxs7rDupMm6LDHyro-xlyiMyUGL6_-9hS9Py7e6udk-fr0Us-XSUvLskoYiFRJkIKVtG1kDlnJaNrKhlJCFW2gga7pRKZaUHmWS5HK-BvLy6IitMlUOkU3x9yts1-j9IGv7ehMPMkpkLQs0gKqqG6PqnXWeycV3zq9EW7PCfBDeTyWxw_lRZoc6bce5P5fx1er-a__AUK_cGE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2013873709</pqid></control><display><type>article</type><title>Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging</title><source>Wiley Online Library - AutoHoldings Journals</source><creator>Alvarez‐Bermejo, José Antonio ; Lopez‐Ramos, Juan Antonio</creator><creatorcontrib>Alvarez‐Bermejo, José Antonio ; Lopez‐Ramos, Juan Antonio</creatorcontrib><description>The implementation of countermeasures to avoid licence abuse is now obligatory, especially with the burgeoning of the Internet. The protocol proposed here is implemented within the session initiation protocol (SIP); this has been selected as the official end‐to‐end signalling protocol for establishing multimedia sessions in the Universal Mobile Telecommunication Systems network. This paper introduces blind signatures, enforced with user‐specific and unique data, modelled from CCD sensors to trace users of these online services, thus avoiding licence sharing that gives access to them. Blind signatures are useful in providing anonymity and establishing a way to tag users. The proposed protocol takes advantage of elliptic curve‐based cryptosystems – smaller key sizes and lower computational resources, an interesting issue for session establishment in S‐Universal Mobile Telecommunication Systems (satellite‐linked networks), where fast and light authentication protocols are a requirement ideal. SIP is a powerful signalling protocol for transmitting media over Internet protocol. Authentication is a vital security requirement for SIP. Hitherto, many authentication schemes have been proposed to enhance SIP security; indeed, the problem of impersonation is one of the topics most discussed. Consequently, a novel authentication and key agreement scheme is proposed for SIP using an elliptic curve cryptosystem. Copyright © 2016 John Wiley &amp; Sons, Ltd.</description><identifier>ISSN: 0170-4214</identifier><identifier>EISSN: 1099-1476</identifier><identifier>DOI: 10.1002/mma.4259</identifier><language>eng</language><publisher>Chichester, UK: John Wiley &amp; Sons, Ltd</publisher><subject>Computer systems ; Cryptography ; Electric communication systems ; elliptic curve cryptosystem ; Elliptic functions ; Forging ; identity forging ; IP (Internet Protocol) ; machine vision ; modelling of light ; Multimedia ; Protocol ; Protocol (computers) ; Security ; Sensors ; session initiation protocol ; Signaling ; Signatures ; Telecommunications industry ; Wireless networks</subject><ispartof>Mathematical methods in the applied sciences, 2018-04, Vol.41 (6), p.2319-2327</ispartof><rights>Copyright © 2016 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright © 2018 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2889-40a3fe0ea482cbe6058423ceb2212f2b0b0dbda5fc0f656ea3e1094687912b5f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fmma.4259$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fmma.4259$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27901,27902,45550,45551</link.rule.ids></links><search><creatorcontrib>Alvarez‐Bermejo, José Antonio</creatorcontrib><creatorcontrib>Lopez‐Ramos, Juan Antonio</creatorcontrib><title>Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging</title><title>Mathematical methods in the applied sciences</title><description>The implementation of countermeasures to avoid licence abuse is now obligatory, especially with the burgeoning of the Internet. The protocol proposed here is implemented within the session initiation protocol (SIP); this has been selected as the official end‐to‐end signalling protocol for establishing multimedia sessions in the Universal Mobile Telecommunication Systems network. This paper introduces blind signatures, enforced with user‐specific and unique data, modelled from CCD sensors to trace users of these online services, thus avoiding licence sharing that gives access to them. Blind signatures are useful in providing anonymity and establishing a way to tag users. The proposed protocol takes advantage of elliptic curve‐based cryptosystems – smaller key sizes and lower computational resources, an interesting issue for session establishment in S‐Universal Mobile Telecommunication Systems (satellite‐linked networks), where fast and light authentication protocols are a requirement ideal. SIP is a powerful signalling protocol for transmitting media over Internet protocol. Authentication is a vital security requirement for SIP. Hitherto, many authentication schemes have been proposed to enhance SIP security; indeed, the problem of impersonation is one of the topics most discussed. Consequently, a novel authentication and key agreement scheme is proposed for SIP using an elliptic curve cryptosystem. Copyright © 2016 John Wiley &amp; Sons, Ltd.</description><subject>Computer systems</subject><subject>Cryptography</subject><subject>Electric communication systems</subject><subject>elliptic curve cryptosystem</subject><subject>Elliptic functions</subject><subject>Forging</subject><subject>identity forging</subject><subject>IP (Internet Protocol)</subject><subject>machine vision</subject><subject>modelling of light</subject><subject>Multimedia</subject><subject>Protocol</subject><subject>Protocol (computers)</subject><subject>Security</subject><subject>Sensors</subject><subject>session initiation protocol</subject><subject>Signaling</subject><subject>Signatures</subject><subject>Telecommunications industry</subject><subject>Wireless networks</subject><issn>0170-4214</issn><issn>1099-1476</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp10E1LAzEQBuAgCtYq-BMCXrxsnWSzX8e61g9o8aJHCdndZE3ZJjXJVvrvTa1XYWAuD-8wL0LXBGYEgN5tNmLGaFadoAmBqkoIK_JTNAFSQMIoYefowvs1AJSE0An6uB-06bDXvRFhdNLj0WvT40H3nwHvhNMiaGs81gbX9QP20njrPBZx8FaEIJ3BwWKxs7rDupMm6LDHyro-xlyiMyUGL6_-9hS9Py7e6udk-fr0Us-XSUvLskoYiFRJkIKVtG1kDlnJaNrKhlJCFW2gga7pRKZaUHmWS5HK-BvLy6IitMlUOkU3x9yts1-j9IGv7ehMPMkpkLQs0gKqqG6PqnXWeycV3zq9EW7PCfBDeTyWxw_lRZoc6bce5P5fx1er-a__AUK_cGE</recordid><startdate>201804</startdate><enddate>201804</enddate><creator>Alvarez‐Bermejo, José Antonio</creator><creator>Lopez‐Ramos, Juan Antonio</creator><general>John Wiley &amp; Sons, Ltd</general><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope></search><sort><creationdate>201804</creationdate><title>Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging</title><author>Alvarez‐Bermejo, José Antonio ; Lopez‐Ramos, Juan Antonio</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2889-40a3fe0ea482cbe6058423ceb2212f2b0b0dbda5fc0f656ea3e1094687912b5f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer systems</topic><topic>Cryptography</topic><topic>Electric communication systems</topic><topic>elliptic curve cryptosystem</topic><topic>Elliptic functions</topic><topic>Forging</topic><topic>identity forging</topic><topic>IP (Internet Protocol)</topic><topic>machine vision</topic><topic>modelling of light</topic><topic>Multimedia</topic><topic>Protocol</topic><topic>Protocol (computers)</topic><topic>Security</topic><topic>Sensors</topic><topic>session initiation protocol</topic><topic>Signaling</topic><topic>Signatures</topic><topic>Telecommunications industry</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alvarez‐Bermejo, José Antonio</creatorcontrib><creatorcontrib>Lopez‐Ramos, Juan Antonio</creatorcontrib><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><jtitle>Mathematical methods in the applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alvarez‐Bermejo, José Antonio</au><au>Lopez‐Ramos, Juan Antonio</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging</atitle><jtitle>Mathematical methods in the applied sciences</jtitle><date>2018-04</date><risdate>2018</risdate><volume>41</volume><issue>6</issue><spage>2319</spage><epage>2327</epage><pages>2319-2327</pages><issn>0170-4214</issn><eissn>1099-1476</eissn><abstract>The implementation of countermeasures to avoid licence abuse is now obligatory, especially with the burgeoning of the Internet. The protocol proposed here is implemented within the session initiation protocol (SIP); this has been selected as the official end‐to‐end signalling protocol for establishing multimedia sessions in the Universal Mobile Telecommunication Systems network. This paper introduces blind signatures, enforced with user‐specific and unique data, modelled from CCD sensors to trace users of these online services, thus avoiding licence sharing that gives access to them. Blind signatures are useful in providing anonymity and establishing a way to tag users. The proposed protocol takes advantage of elliptic curve‐based cryptosystems – smaller key sizes and lower computational resources, an interesting issue for session establishment in S‐Universal Mobile Telecommunication Systems (satellite‐linked networks), where fast and light authentication protocols are a requirement ideal. SIP is a powerful signalling protocol for transmitting media over Internet protocol. Authentication is a vital security requirement for SIP. Hitherto, many authentication schemes have been proposed to enhance SIP security; indeed, the problem of impersonation is one of the topics most discussed. Consequently, a novel authentication and key agreement scheme is proposed for SIP using an elliptic curve cryptosystem. Copyright © 2016 John Wiley &amp; Sons, Ltd.</abstract><cop>Chichester, UK</cop><pub>John Wiley &amp; Sons, Ltd</pub><doi>10.1002/mma.4259</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0170-4214
ispartof Mathematical methods in the applied sciences, 2018-04, Vol.41 (6), p.2319-2327
issn 0170-4214
1099-1476
language eng
recordid cdi_proquest_journals_2013873709
source Wiley Online Library - AutoHoldings Journals
subjects Computer systems
Cryptography
Electric communication systems
elliptic curve cryptosystem
Elliptic functions
Forging
identity forging
IP (Internet Protocol)
machine vision
modelling of light
Multimedia
Protocol
Protocol (computers)
Security
Sensors
session initiation protocol
Signaling
Signatures
Telecommunications industry
Wireless networks
title Blind signatures using light variations in CCD sensors as a pattern to avoid identity forging
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T14%3A37%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blind%20signatures%20using%20light%20variations%20in%20CCD%20sensors%20as%20a%20pattern%20to%20avoid%20identity%20forging&rft.jtitle=Mathematical%20methods%20in%20the%20applied%20sciences&rft.au=Alvarez%E2%80%90Bermejo,%20Jos%C3%A9%20Antonio&rft.date=2018-04&rft.volume=41&rft.issue=6&rft.spage=2319&rft.epage=2327&rft.pages=2319-2327&rft.issn=0170-4214&rft.eissn=1099-1476&rft_id=info:doi/10.1002/mma.4259&rft_dat=%3Cproquest_cross%3E2013873709%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2013873709&rft_id=info:pmid/&rfr_iscdi=true