Publication IEICE TRANSACTIONS on Information and SystemsVol.E88-DNo.5pp.1077-1081 Publication Date: 2005/05/01 Online ISSN: DOI: 10.1093/ietisy/e88-d.5.1077 Print ISSN: 0916-8532 Type of Manuscript: LETTER Category: Networks Keyword: mobile communications security, network security, authentication,
Full Text: PDF(111.4KB)>>
Summary: When an application code is downloaded from an unknown server to the mobile device, it is important to authenticate the code. Usually, code execution is overlapped with downloading to reduce transfer/invocation delay. In this letter, we present an efficient code authentication scheme that permits overlapping of execution and downloading when the sequence of code execution is determined during the execution time. The proposed scheme is based on authentication trees. Compared with the tree chaining scheme, the proposed scheme has lower communication overhead and shorter average verification delay. Also, the computation cost of the proposed scheme on the receiver is much smaller than that of the tree chaining scheme.