scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Secure communication and authentication using Raspberry Pi

Vidur Kakar1
01 Sep 2016-pp 521-525
TL;DR: This hardware and algorithm aims at creating a mobile payment terminal through which transactions can be carried out securely using the Transport Layer Security (TLS) protocol through a Raspberry Pi module.
Abstract: Secure communication and authentication are two very important factors when it comes to applications such as payments. Since payments involve critical information such as user account number, pin, balance, etc., it becomes very vulnerable to fraudulent elements that want to gain access to this information illegally. Thus, this hardware and algorithm aims at creating a mobile payment terminal through which transactions can be carried out securely using the Transport Layer Security (TLS) protocol through a Raspberry Pi module.
References
More filters
Journal ArticleDOI
TL;DR: The author looks at the collection of standards that make up TLS, including its history, protocol, and future, for securing client-server communications over the Internet.
Abstract: Transport Layer Security is the standard, widely deployed protocol for securing client-server communications over the Internet. TLS is designed to prevent eavesdropping, tampering, and message forgery for client-server applications. Here, the author looks at the collection of standards that make up TLS, including its history, protocol, and future.

508 citations


"Secure communication and authentica..." refers background in this paper

  • ...It showed that the data being exchanged was indeed following the Transport Layer Security (TLS) protocol....

    [...]

  • ...The primary goal of TLS is to provide privacy and data integrity between the two communicating computer applications....

    [...]

  • ...The core standard governing our project is TLS. TLS contains a set of cryptographic protocols designed to provide communication security over a computer network....

    [...]

  • ...Thus TLS has mainly two parts, that is, certificate verification and data encryption....

    [...]

  • ...The TLS handshake[7] marks the starting of the communication between the client and the server....

    [...]

Book ChapterDOI
19 Aug 2012
TL;DR: The notion of authenticated and confidential channel establishment ACCE is defined as a new security model which captures precisely the security properties expected from TLS in practice, and the combination of the TLS Handshake with data encryption in the TLS Record Layer can be proven secure in this model.
Abstract: TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. We give the first such proof for the core cryptographic protocol of TLS ciphersuites based on ephemeral Diffie-Hellman key exchange TLS-DHE, which include the cipher suite TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA mandatory in TLS 1.0 and TLS 1.1. It is impossible to prove security of the TLS Handshake protocol in any classical key-indistinguishability-based security model like for instance the Bellare-Rogaway or the Canetti-Krawczyk model, due to subtle issues with the encryption of the final Finished messages. Therefore we start with proving the security of a truncated version of the TLS-DHE Handshake protocol, which has been considered in previous works on TLS. Then we define the notion of authenticated and confidential channel establishment ACCE as a new security model which captures precisely the security properties expected from TLS in practice, and show that the combination of the TLS Handshake with data encryption in the TLS Record Layer can be proven secure in this model.

251 citations


"Secure communication and authentica..." refers background in this paper

  • ...The TLS handshake[7] marks the starting of the communication between the client and the server....

    [...]

Journal ArticleDOI
TL;DR: An overview on the current state of high performance cloud computing technology is given and the underlying virtualization techniques and management methods are described, and a novel approach to use high speed cluster interconnects like InfiniBand in a highperformance cloud computing environment is presented.

180 citations


"Secure communication and authentica..." refers methods in this paper

  • ...Creation of an EC2 instance on Amazon Web Services – A server was setup on an EC2 instance of Ubuntu based system on Amazon Web Services on which the all user details would be stored securely and our server side of the code would be run here on the cloud[9]....

    [...]

Journal ArticleDOI
TL;DR: The future Internet is an IPv6 network interconnecting traditional computers and a large number of smart objects that will be the foundation of many services and the authors' daily lives.
Abstract: The future Internet is an IPv6 network interconnecting traditional computers and a large number of smart objects. This Internet of Things (IoT) will be the foundation of many services and our daily ...

180 citations


"Secure communication and authentica..." refers methods in this paper

  • ...Exchanging this data from the central server and facilitating the whole transaction process securely[1]....

    [...]

22 May 2013
TL;DR: This work proposes an architecture supporting low-power end-to-end transport-layer secure communications with mutual authentication using ECC public-key cryptography for Internet-integrated sensing applications, providing full compatibility with current standardization proposals.
Abstract: The Internet of Things (IoT) describes a vision of a future Internet where constrained sensing and actuating devices are part of distributed applications and required to support standard Internet communications with more powerful devices or Internet hosts. This vision will require appropriate end-to-end communications and security mechanisms that are well suited to the constraints and characteristics of sensing devices and applications, while being able to support standard Internet communication mechanisms. With this motivation in mind, we propose an architecture supporting low-power end-to-end transport-layer secure communications with mutual authentication using ECC public-key cryptography for Internet-integrated sensing applications. The proposed architecture promotes the availability of critical resources on constrained sensing platforms and security against Internet-originated threats, while providing full compatibility with current standardization proposals. Those are fundamental enabling factors of most of the sensing applications envisioned for the IoT and, as far as we known, ours is the first architecture implemented and experimentally evaluated with such goals.

74 citations


"Secure communication and authentica..." refers background in this paper

  • ...js for the client-server communication and follows the Transport Layer Security (TLS) for data exchange[10]....

    [...]