TITLE

Secure Mutual Authentication Protocol

AUTHOR(S)
Nakhate, Seema P.; Goudar, R. M.
PUB. DATE
April 2014
SOURCE
International Journal of Computer Networks & Communications Secu;Apr2014, Vol. 2 Issue 4, p142
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device. ECC based mutual authentication protocol is best suited for constrained environments where the resources such as computational power, storage capacity are extremely limited. Devices are such as Mobile phones, PDA's, palmtops, smart cards.
ACCESSION #
97122511

 

Related Articles

  • Attacks Based on Oracle in Authentication Protocols. Li Qiang; Kaigui Wu; Li Fang // International Journal of Digital Content Technology & its Applic;Feb2013, Vol. 7 Issue 4, p454 

    Many authentication protocols which provide the communicating parties with some assurance of each other' identities have been brought up. However, to some extent, they are not perfect when used in security authentication. For example, the attacks that using oracle to accomplish some illegal...

  • QUANTITATIVE EVALUATION OF IDENTITY BASED CRYPTOGRAPHY IN AN AUTHENTICATION SCENARIO. PURA, Mihai-Lica // Proceedings of the Scientific Conference AFASES;May2013, p405 

    Identity based cryptography is a particular case of asymmetric cryptography in which the public key is chosen so that it uniquely identifies its owner. This information can be any identifier of a person or a system, like the e-mail address, the IP address, and so on. This way there is no need...

  • A Secure Constant Round Authenticated Group Key Agreement for Dynamic Groups. Lili Yan; Yan Chang // International Journal of Digital Content Technology & its Applic;Mar2013, Vol. 7 Issue 5, p341 

    Dutta and Barua presented a group key agreement protocol (DB) in dynamic scenario, two flaws have been found by Teo et al. and Tan et al., that is, the leave protocol does not provide forward secrecy and the protocol is insecure against an outsider adversary. In this paper, a secure constant...

  • An Enhanced Password-based Group Key Agreement Protocol with Constant Rounds. Wei Yuan; Liang Hu // Applied Mathematics & Information Sciences;2014, Vol. 8 Issue 5, p2589 

    In PKC 2006, Abdalla et al. proposed a password-based group key exchange protocol with constant rounds and proved that protocol could resist the offline dictionary attacks in the random-oracle and ideal-cipher models. Then they proposed an open problem whether an adversary can test more than one...

  • Password Authentication with Secured Login Interface at Application Layer. Agrawal, Vivek Kumar; Bharti, R. K.; Parihar, Bhawana // International Journal of Computer Science & Network Security;Sep2014, Vol. 14 Issue 9, p82 

    In this paper we present a innovative solution to the old problem of password security at application layer or input level. In our solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random single...

  • Multiple Key Exchange Protocol with high efficiency. Tong YI; Xuebao Li; Hongchao CHEN; Shuling ZHENG // International Journal of Digital Content Technology & its Applic;Apr2013, Vol. 7 Issue 8, p496 

    This paper first analyses two existing password-authenticated key exchange protocols for three-party and points out they are both insecure. In order to solve the problem that most of existing verifier-based 3pake protocols can not resist server key disclosure attack, we present an efficient...

  • An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without using Bilinear Pairings. Ramesh, S.; Bhaskaran, V. Murali // International Journal of Engineering & Technology (0975-4024);Dec2013/Jan2014, Vol. 5 Issue 6, p5140 

    Login to the remote server over unreliable insecure network demands secured password a secured password authentication with less computational cost. We have proposed a remote user authentication scheme based on ECC that establish strong authentication with key agreement. As the password verifier...

  • Simulation study of MANET routing protocols under FTP traffic. Kampitaki, Dimitra; Economides, Anastasios A. // Interdisciplinarity in Engineering;2014, Vol. 17, p231 

    Mobile Ad Hoc Networks (MANETs) use many different routing protocols to route data packets between nodes. The performance of these routing protocols has been widely studied and evaluated. However, previous studies evaluate the performance of routing protocols using traffic generators that do not...

  • An Improvement over AODV Routing Protocol by Limiting Visited Hop Count. Fotohi, Reza; Jamali, Shahram; Sarkohaki, Fateme; Behzad, Shahram // International Journal of Information Technology & Computer Scien;Aug2013, Vol. 5 Issue 9, p87 

    The AODV protocol is based on the minimum delay path as its route selection criteria, regardless of the paths load. This issue leads to unbalanced load dissemination in the network and the energy of the nodes on the shortest path deplete earlier than others. We proposed an improved AODV protocol...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics