Abstract

User identity authentication is the foundation of data transmission in the complicated network environment. Moreover, the key issue is the effective identity authentication of both sides in data transmission. An authentication method for user identity based on two-way confirmation in data transmission is proposed in this paper. The public key, private key, information of traditional identity authentication, one-time transmission key, timestamp, authentication lifecycle for timestamp and other authentication elements are constructed. Based on guaranteeing the timeliness of data transmission, the two-way user identity authentication process for sending terminal and receiving terminal is set up through using the information of traditional identity authentication and one-time transmission key.

Highlights

  • The security of data transmission is the foundation of running the Internet safely

  • The authentication elements of the data sender consist of public key, private key, traditional identity authentication information, one-time transmission key, timestamp and authentication lifecycle

  • The existed single-way authentication in data transmission ensures data sender to be in security to an extent

Read more

Summary

Introduction

The security of data transmission is the foundation of running the Internet safely. How to verify the valid identity of data sender and receiver is crucial to keep data transmission in security. It makes authentication technologies for user identities be vitally important [1]. Security events about data transmission broke out frequently, such as data leak of 20 million hotel records. These events were concerned by the society and caused huge economy loss. The rising severe situation of data transmission security has caused user identity authentication technologies for data transmission be one of hot topics in the field of network security

Research background
Authentication elements
Authentication method
Data Connection
Splitting Data
Encapsulating and Sending Data
Receiving and Assembling Data
Connection Close
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call