User Authentication in Mobile Computing Environment

Akio TAKUBO, Mutsumi ISHIKAWA, Takashi WATANABE, Masakazu SOGA, Tadanori MIZUNO

  • Full Text Views

    0

  • Cite this

Summary :

The computers are connected with each other by the network as a result of the progress of technology in the field of the computer and network, and then all of the data to be processed are transferred quickly and at the real-time through the computer network. However the user can use the computer system at any time, the user must go to the location of the computer system to use the computer resources. The necessities for using the computer system occur anywhere and anytime in spite of the location of the computer system. For this requirement the mobile computing environment (MCE) is expected strongly. In this paper we introduce the model of MCE and discuss the need of the user authentication at entering and logging-in the network in MCE only with a user ID. We propose the method of a user ID assignment from which a server ID can be decided by a simple logical operation. Also, we propose a protocol for a user authentication in MCE and discuss the robustness of security against the various attacking on the route.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E80-A No.7 pp.1288-1298
Publication Date
1997/07/25
Publicized
Online ISSN
DOI
Type of Manuscript
Special Section PAPER (Special Section on Multi-dimensional Mobile Information Network)
Category

Authors

Keyword

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.