An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Title | An efficient remote mutual authentication scheme using smart mobile phone over insecure networks |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Amin, R., Islam, S. K. H., Biswas, G. P., Khan, M. K. |
Conference Name | 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) |
Date Published | jun |
Keywords | authentication, AVISPA, AVISPA simulator tool, CL-AtSe back-ends, Computer crime, cryptographic protocols, insecure networks, insider attack, key secrecy, Law, MAS, message authentication, mobile application software, mobile computing, mobile radio, mobile user, off-line identity-password guessing attacks, OFMC, password change operation, Protocols, pubcrawl170109, remote mutual authentication protocol, remote server, secure connection, security attacks, Servers, session key agreement scheme, smart cards, smart mobile phone, Smart Mobile Phones, smart phones, telecommunication security, user anonymity, user-server impersonation attacks |
Abstract | To establish a secure connection between a mobile user and a remote server, this paper presents a session key agreement scheme through remote mutual authentication protocol by using mobile application software(MAS). We analyzed the security of our protocol informally, which confirms that the protocol is secure against all the relevant security attacks including off-line identity-password guessing attacks, user-server impersonation attacks, and insider attack. In addition, the widely accepted simulator tool AVISPA simulates the proposed protocol and confirms that the protocol is SAFE under the OFMC and CL-AtSe back-ends. Our protocol not only provide strong security against the relevant attacks, but it also achieves proper mutual authentication, user anonymity, known key secrecy and efficient password change operation. The performance comparison is also performed, which ensures that the protocol is efficient in terms of computation and communication costs. |
URL | http://ieeexplore.ieee.org/document/7166114/ |
DOI | 10.1109/CyberSA.2015.7166114 |
Citation Key | amin_efficient_2015 |
- session key agreement scheme
- password change operation
- Protocols
- pubcrawl170109
- remote mutual authentication protocol
- remote server
- secure connection
- security attacks
- Servers
- OFMC
- smart cards
- smart mobile phone
- Smart Mobile Phones
- smart phones
- telecommunication security
- user anonymity
- user-server impersonation attacks
- Law
- AVISPA
- AVISPA simulator tool
- CL-AtSe back-ends
- Computer crime
- Cryptographic Protocols
- insecure networks
- insider attack
- key secrecy
- authentication
- MAS
- message authentication
- mobile application software
- mobile computing
- mobile radio
- mobile user
- off-line identity-password guessing attacks