Authenticating Electronic Devices for Temporary Use: Access Rights Management Protocol

Telecommunication Systems and Computer Networks

The number of active wearable devices per user is growing daily. Conventionally, authentication algorithms were responsible for the security of such systems especially in terms of the Internet of Things (IoT) paradigm. This manuscript proposes an authentication protocol specifically designed for operation under unreliable connectivity to trusted authority constraints. Such situations may occur both in cases of network overload and in distant areas with low network coverage. The summary on existing solutions as well as the benefits brought by the solution are discussed. A detailed description of the protocol execution phases enabling integrity and privacy for the owner and the temporary user is also given.

Citation: Ometov A.Ya., Bezzateev S.V., Koucheryavy Y.A. Authenticating electronic devices for temporary use: access rights management protocol. St. Petersburg State Polytechnical University Journal. Computer Science. Telecommunications and Control Systems, 2017, Vol. 10, No. 4, Pp. 29–40. DOI: 10.18721/JCSTCS.10403