Title :
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Author :
Amin, Ruhul ; Hafizul Islam, S.K. ; Biswas, G.P. ; Khan, Muhammad Khurram
Author_Institution :
Dept. Of Comput. Sci. & Eng., Indian Sch. of Mines, Dhanbad, India
Abstract :
To establish a secure connection between a mobile user and a remote server, this paper presents a session key agreement scheme through remote mutual authentication protocol by using mobile application software(MAS). We analyzed the security of our protocol informally, which confirms that the protocol is secure against all the relevant security attacks including off-line identity-password guessing attacks, user-server impersonation attacks, and insider attack. In addition, the widely accepted simulator tool AVISPA simulates the proposed protocol and confirms that the protocol is SAFE under the OFMC and CL-AtSe back-ends. Our protocol not only provide strong security against the relevant attacks, but it also achieves proper mutual authentication, user anonymity, known key secrecy and efficient password change operation. The performance comparison is also performed, which ensures that the protocol is efficient in terms of computation and communication costs.
Keywords :
computer crime; cryptographic protocols; message authentication; mobile computing; mobile radio; smart phones; telecommunication security; AVISPA simulator tool; CL-AtSe back-ends; MAS; OFMC; insecure networks; insider attack; key secrecy; mobile application software; mobile user; off-line identity-password guessing attacks; password change operation; remote mutual authentication protocol; remote server; secure connection; security attacks; session key agreement scheme; smart mobile phone; user anonymity; user-server impersonation attacks; Authentication; Law; Protocols; Servers; Smart cards; AVISPA; Authentication; Security Attacks; Smart Mobile Phones;
Conference_Titel :
Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015 International Conference on
Conference_Location :
London
DOI :
10.1109/CyberSA.2015.7166114