An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading

JaeYong JEONG
Yongsu PARK
Yookun CHO

Publication
IEICE TRANSACTIONS on Information and Systems   Vol.E88-D    No.5    pp.1077-1081
Publication Date: 2005/05/01
Online ISSN: 
DOI: 10.1093/ietisy/e88-d.5.1077
Print ISSN: 0916-8532
Type of Manuscript: LETTER
Category: Networks
Keyword: 
mobile communications security,  network security,  authentication,  

Full Text: PDF(111.4KB)>>
Buy this Article



Summary: 
When an application code is downloaded from an unknown server to the mobile device, it is important to authenticate the code. Usually, code execution is overlapped with downloading to reduce transfer/invocation delay. In this letter, we present an efficient code authentication scheme that permits overlapping of execution and downloading when the sequence of code execution is determined during the execution time. The proposed scheme is based on authentication trees. Compared with the tree chaining scheme, the proposed scheme has lower communication overhead and shorter average verification delay. Also, the computation cost of the proposed scheme on the receiver is much smaller than that of the tree chaining scheme.


open access publishing via