• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

1998 Fiscal Year Final Research Report Summary

User authentication protocol in a Mobile Computing Environment

Research Project

Project/Area Number 09650409
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeSingle-year Grants
Section一般
Research Field 情報通信工学
Research InstitutionShizuoka University

Principal Investigator

MIZUNO Tadanori  Shizuoka Univ. Dept. of Information, Professor, 情報学部, 教授 (80252162)

Co-Investigator(Kenkyū-buntansha) WATANABE Takashi  Shizuoka Univ. Dept. of Information, Associate Professor, 情報学部, 助教授 (90201201)
SOGA Masakazu  Shizuoka Univ. Dept. of Information, Professor, 情報学部, 教授 (20283327)
Project Period (FY) 1997 – 1998
KeywordsMobile Computing / Security / User Authentication
Research Abstract

This research have studied a network security problem, especially authentication arisen in a mobile computing environment. In the environment, a user who had been registered to its home server. And when he moves to a new location, he has to be authenticated through unregistered mobile server. We build in 1997 the fundamental structure of a third party authentication protocol utilized in a mobile environment, which is an extension of Kerberos proposed for a wired network. The proposed protocol is called GMAP (Global Mobile Authentication Protocol). With GMAP a mobile user accesses the nearest mobile server, the server routes the encrypted request to an authentication server and a ticket server, then the user is authenticated by the servers and can access to the destination host. The protocol reduces the wireless traffic.
In 1998, we developed authentication protocol security simulator called SS/AG (Security Simulator with Attack Generator) to ensure the robustness of the protocol. SS/AG simulates predefined protocol with possible attacks on every link, i. e., wiretapping, replay attack etc. The protocol is applied to an agent system called SFM (Secure Floating Market) model one of whose applications is electric commerce, and the prototype of the model is implemented on UNIX workstation.

  • Research Products

    (8 results)

All Other

All Publications (8 results)

  • [Publications] 田窪昭夫: "Authentication Protocol for Mobile Computing Environment"Proc.of 11th International Conference on Information Networking. 9A41-9A45 (1997)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 田窪昭夫: "User Authentication in Mobile Computing Encironment"電子情報通信学会 英文論文誌. E80A-No7. 1288-1298 (1997)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 石川睦: "モーバイル計算機環境におけるセキュリティシミュレータについて"情報処理学会マルチメディア、分散、協調とモーバイルワークショップ論文集. 97-No2. 599-604 (1997)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] 隆朋也: "A model of Mobile Agent Services Enhanced for Resource Restrictions and Security"Proc.of「ICPADS'98」. 274-281 (1998)

    • Description
      「研究成果報告書概要(和文)」より
  • [Publications] Akio Takubo: "Authentication Protocol for Mobile Computing Enveironment"Proceedings of The 11th International conference on Information Networking (ICOIN-11). 9A41-9A45 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Akio Takubo: "User Authentication in Mobile Computing Environment"IEICE Trans. Fundamentals.. vol.E80-A, No.7. 1288-1298 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Mutsumi Ishikawa: "Security Simulator of Mobile Computing Environment"Proceedings of DiCoMo ' 97. vol.97, No.2. 599-604 (1997)

    • Description
      「研究成果報告書概要(欧文)」より
  • [Publications] Tomoya Taka: "A Model of Mobile Agent Services Enhanced for Resource Restrictions and Security."Proceedings of ICPADS ' 98. 274-281 (1998)

    • Description
      「研究成果報告書概要(欧文)」より

URL: 

Published: 2001-10-23  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi