Featured Research

from universities, journals, and other organizations

Who goes there? Verifying identity online

Date:
February 17, 2012
Source:
Inderscience Publishers
Summary:
We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an identity-based network system is useful because it is relatively simple. However, there are three major drawbacks including loss of anonymity of communicating users, misplaced trust and identity theft.

We are all used to logging into networks where we have a unique identity, verified by the network server and associated with our account for other members of the network to see. Such an identity-based network system is useful because it is relatively simple. However, there are three major drawbacks including loss of anonymity of communicating users, misplaced trust and identity theft.

Researchers at the University of Texas at Austin have devised a new type of network that allows users to be authenticated without relying on unique identities.

Writing in the International Journal of Security and Networks, Mohamed Gouda and colleagues asked themselves how they might get around these three problem areas of conventional networks. How can one design a network without user identities and what does it mean for a user to authenticate another in such a network? They suggest that rather than each user having an identity, a network based on an addressing system associated with an unlimited, user-selected list of pseudonyms can circumvent all the problems of loss of anonymity, identity theft and misplaced trust. The network authority server is then the only party, other than each user that knows their address and which of their pool of pseudonyms is associated with the address at any given time.

"The problem of anonymous communication over a network is an old and respected problem, and has inspired a considerable amount of research," the researchers explain. Papers dating back to at least 1981 have attempted to address this issue. Anonymized email based on encryption and the layered connection approach of the Tor protocol, and Onion routing, have been used successfully over the last couple of decades. However, all of these approaches have scaling problems that limit the number of concurrent users without huge investment in network servers to carry the requisite data traffic.

The researchers explain that in their novel network structure users do not have identities. Users are contacted by searching for their pseudonyms, which they change frequently. Authentication is done by the users themselves, not by the certification of a central authority. In this network, as there is no identity, there is no identity theft. "We suggest that this may be a whole new kind of network, distinct from both traditional client-server and reputation-based peer-to-peer networks," the team says.


Story Source:

The above story is based on materials provided by Inderscience Publishers. Note: Materials may be edited for content and length.


Journal Reference:

  1. Mohamed Gouda et al. Is that you? Authentication in a network without identities. International Journal of Security and Networks, 2012; vol 6, issue 4, 181-190

Cite This Page:

Inderscience Publishers. "Who goes there? Verifying identity online." ScienceDaily. ScienceDaily, 17 February 2012. <www.sciencedaily.com/releases/2012/02/120217145749.htm>.
Inderscience Publishers. (2012, February 17). Who goes there? Verifying identity online. ScienceDaily. Retrieved July 22, 2014 from www.sciencedaily.com/releases/2012/02/120217145749.htm
Inderscience Publishers. "Who goes there? Verifying identity online." ScienceDaily. www.sciencedaily.com/releases/2012/02/120217145749.htm (accessed July 22, 2014).

Share This




More Matter & Energy News

Tuesday, July 22, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Government Approves East Coast Oil Exploration

Government Approves East Coast Oil Exploration

AP (July 18, 2014) — The Obama administration approved the use of sonic cannons to discover deposits under the ocean floor by shooting sound waves 100 times louder than a jet engine through waters shared by endangered whales and turtles. (July 18) Video provided by AP
Powered by NewsLook.com
Sunken German U-Boat Clearly Visible For First Time

Sunken German U-Boat Clearly Visible For First Time

Newsy (July 18, 2014) — The wreckage of the German submarine U-166 has become clearly visible for the first time since it was discovered in 2001. Video provided by Newsy
Powered by NewsLook.com
Obama: U.S. Must Have "smartest Airports, Best Power Grid"

Obama: U.S. Must Have "smartest Airports, Best Power Grid"

Reuters - US Online Video (July 17, 2014) — President Barak Obama stopped by at a lunch counter in Delaware before making remarks about boosting the nation's infrastructure. Mana Rabiee reports. Video provided by Reuters
Powered by NewsLook.com
Crude Oil Prices Bounce Back After Falling Below $100 a Barrel

Crude Oil Prices Bounce Back After Falling Below $100 a Barrel

TheStreet (July 16, 2014) — Oil Futures are bouncing back after tumbling below $100 a barrel for the first time since May yesterday. Jeff Grossman is the president of BRG Brokerage and trades at the NYMEX. Grossman tells TheStreet the Middle East is always a concern for oil traders. Oil prices were pushed down in recent weeks on Libya increasing its production. Supply disruptions in Iraq fading also contributed to prices falling. News from China's economic front showing a growth for the second quarter also calmed fears on its slowdown. Jeff Grossman talks to TheStreet's Susannah Lee on this and more on the Energy Department's Energy Information Administration (EIA) report. Video provided by TheStreet
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins