Visible to the public An efficient remote mutual authentication scheme using smart mobile phone over insecure networks

TitleAn efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Publication TypeConference Paper
Year of Publication2015
AuthorsAmin, R., Islam, S. K. H., Biswas, G. P., Khan, M. K.
Conference Name2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Date Publishedjun
Keywordsauthentication, AVISPA, AVISPA simulator tool, CL-AtSe back-ends, Computer crime, cryptographic protocols, insecure networks, insider attack, key secrecy, Law, MAS, message authentication, mobile application software, mobile computing, mobile radio, mobile user, off-line identity-password guessing attacks, OFMC, password change operation, Protocols, pubcrawl170109, remote mutual authentication protocol, remote server, secure connection, security attacks, Servers, session key agreement scheme, smart cards, smart mobile phone, Smart Mobile Phones, smart phones, telecommunication security, user anonymity, user-server impersonation attacks
Abstract

To establish a secure connection between a mobile user and a remote server, this paper presents a session key agreement scheme through remote mutual authentication protocol by using mobile application software(MAS). We analyzed the security of our protocol informally, which confirms that the protocol is secure against all the relevant security attacks including off-line identity-password guessing attacks, user-server impersonation attacks, and insider attack. In addition, the widely accepted simulator tool AVISPA simulates the proposed protocol and confirms that the protocol is SAFE under the OFMC and CL-AtSe back-ends. Our protocol not only provide strong security against the relevant attacks, but it also achieves proper mutual authentication, user anonymity, known key secrecy and efficient password change operation. The performance comparison is also performed, which ensures that the protocol is efficient in terms of computation and communication costs.

URLhttp://ieeexplore.ieee.org/document/7166114/
DOI10.1109/CyberSA.2015.7166114
Citation Keyamin_efficient_2015