Filters








26 Hits in 5.1 sec

Efficient Hierarchical Authentication Protocol for Multiserver Architecture

Jiangheng Kou, Mingxing He, Ling Xiong, Zeqiong Lv
2020 Security and Communication Networks  
The multiserver architecture authentication (MSAA) protocol plays a significant role in achieving secure communications between devices.  ...  multiserver architecture using a Merkle tree to verify user's authentication right.  ...  [13] proposed a list-free ID-based authentication protocol using bilinear pairings for the multiserver architecture. However, Tseng et al.  ... 
doi:10.1155/2020/2523834 fatcat:6yogph7fhndt3hwpocoq7g62ua

A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments

Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari
2017 Security and Communication Networks  
Besides, our protocol supports session key agreement and mutual authentication between the application server and the user.  ...  It is observed that the existing RSA-based multiserver authentication protocols are not suitable in terms of computation complexities and security attacks.  ...  Acknowledgments The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through Research Group no. RG-288.  ... 
doi:10.1155/2017/5989151 fatcat:aidjj6zt6zaj5jlcmaw2r6dds4

Secure Multifactor Authentication and Access Control Mechanism for Electronic Bill Service in a 5G Cloud-Fog Hybrid Architecture

Zhenyang Guo, Yueyu Zhang, Jin Cao, Xiongpeng Ren, Xingwen Zhao, Hui Li, AnMin Fu
2022 Security and Communication Networks  
This paper proposes a secure multifactor authentication and access control scheme tailored for electronic bill service in a 5G cloud-fog hybrid architecture.  ...  The proposed scheme can realize many security properties, including mutual authentication, privacy protection, batch authentication, authorization and revocation of authority, and resistance to multiple  ...  [17] . e scheme in [17] also presented a new protocol based on biometric, smart cards, and ECC. e schemes in [18, 19] also proposed a new authentication and key agreement (AKA) protocol.  ... 
doi:10.1155/2022/3658402 fatcat:wco3z7dlfjapnfh5by42uzgz2e

A Secure Dynamic Identity based Single Sign-On Authentication Protocol

Qingqi Pei, Jie Yu
2014 Journal of Software  
There many Authentication protocol proposed for the SSO system. In this paper, we first introduced the SSO system and expounded the importance of the authentication protocol in the SSO system.  ...  In the current Internet world, most of the Internet services are based on the single server model and use the password identity authentication to provide application service for the users, this means that  ...  Based on all the authentication protocols above, we know that a secure and efficient remote user authentication protocol for multi-server environment should provide mutual authentication, key agreement  ... 
doi:10.4304/jsw.9.1.154-161 fatcat:lhaobizinzbldocicgwi7tw33i

Dynamic Identity Based Authentication Protocol for Two-Server Architecture

Sandeep K. Sood
2012 Journal of Information Security  
Most of the password based authentication protocols make use of the single authentication server for user's authentication.  ...  In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment.  ...  [6] proposed an efficient password authentication key agreement protocol for multi-server architecture in which user can access multiple servers using smart card and one weak password.  ... 
doi:10.4236/jis.2012.34040 fatcat:im3qkyungzg7pmwg4ksvekj5eu

Enhanced Smartcard based Multi-Server Authentication Scheme

Hee-Joo Park, Chonggun Kim
2013 International Journal of Security and Its Applications  
The proposed scheme is suitable for use in distributed multi-server architecture since it provides mutual authentication, efficiency and security.  ...  It is not easy task for users to remember these different identities and passwords for each server. To solve the problem, various multiserver authentication schemes have been proposed.  ...  For tackling the efficiency problem of Li et al., scheme, Juang proposed an efficient multi-server key agreement protocol based on the hash function and the symmetric key cryptosystem [12] .  ... 
doi:10.14257/ijsia.2013.7.6.16 fatcat:xpmkyyidyzeyvctvhv6qodiwj4

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy.  ...  Based on the categorization of the authentication and privacy models, we classify these schemes in seven types, including, handover authentication with privacy, mutual authentication with privacy, RFID  ...  [110] proposed a user-touser mutual authentication and key agreement scheme, which is more compatible with the LTE security architecture.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems

Shuyun Shi, Min Luo, Yihong Wen, Lianhai Wang, Debiao He, Mamoun Alazab
2022 Security and Communication Networks  
Thus, in this article, we proposed a blockchain-based user authentication scheme integrating with access control and physical unclonable function (PUF).  ...  Security analysis shows that our protocol satisfies the security requirements for telehealth services and is provably secure in the random oracle model.  ...  Session key agreement: Based on the description of the proposed scheme, the user and the server will generate a session key SK � h 6 (X ′ ‖X‖Y � � � � � K ij � � � �ID i � � � � � ID S j ) for future secure  ... 
doi:10.1155/2022/6735003 fatcat:2raprqyoirarjo62vkim5vr2xu

Efficient Hierarchical Multi-Server Authentication Protocol For Mobile Cloud Computing

Jiangheng Kou, Mingxing He, Ling Xiong, Zihang Ge, Guangmin Xie
2020 Computers Materials & Continua  
The multi-server architecture authentication protocols for mobile cloud computing were proposed to ensure the security and availability between mobile devices and mobile services.  ...  For this reason, we propose a new hierarchical multi-server authentication protocol for mobile cloud computing.  ...  [Tseng, Huang, Tsai et al. (2016) ] proposed a list-free ID-based authentication protocol using bilinear pairings for multi-server architecture. However, Tseng et al.  ... 
doi:10.32604/cmc.2020.09758 fatcat:sdzdh22cpfbtxp3ilqecmndv5q

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

2016 KSII Transactions on Internet and Information Systems  
This research aims at improving the Zhu's protocol in terms of cost and efficiency.  ...  Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.  ...  A few chaotic map-based protocols for key agreement authentication have been proposed in the last few years [1] [2] [3] [4] [5] .  ... 
doi:10.3837/tiis.2016.12.023 fatcat:a25q677hqzaxjjiij55rq32lcu

Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks

Guangsong Li, Yang Wang, Bin Zhang, Siqi Lu
2020 Mobile Information Systems  
In this paper, we propose a cross-domain authentication and key agreement system based on smart contract of blockchains.  ...  On this basis, a cross-domain authentication and key agreement protocol is designed.  ...  Based on these characteristics, a smart contract-based authentication and key agreement system is designed for heterogeneous wireless networks.  ... 
doi:10.1155/2020/2964562 fatcat:2gbljxcoczgmllymgvbpagu4qa

AN EFFICIENT TWO-SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES

Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta
2018 Jordanian Journal of Computers and Information Technology  
To achieve this, there is a need for a robust authentication mechanism. Towards the solution, a number of single server authenticated key agreement protocols have been reported recently.  ...  This work proposes an efficient password-based two-server authentication and key exchange protocol addressing the major limitations in the existing protocols.  ...  ACKNOWLEDGEMENTS The authors thank the anonymous reviewers and the Editor-in Chief for their valuable suggestions, which helped us improve significantly the presentation and quality of the paper.  ... 
doi:10.5455/jjcit.71-1513237171 fatcat:jostmwzqa5gmxl32ebkxh2soqy

An Efficient Anonymous Authentication Scheme for Mobile Pay-TV Systems

Yuting Li, Qingfeng Cheng, Jinzheng Cao
2020 Wireless Communications and Mobile Computing  
In this paper, we analyze the shortcomings of the existing authentication protocol and then propose an improved one, which is secure against stored set attack and user traceability attack.  ...  Anonymous authentication schemes for mobile pay-TV systems came into being.  ...  Moreover, three-factor authentication and key agreements have also been widely used for cloud environment [11, 12] .  ... 
doi:10.1155/2020/8850083 fatcat:pabhd4zh6femnjc3mf6tm526ta

Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments

Ping Wang, Bin Li, Hongjin Shi, Yaosheng Shen, Ding Wang
2019 Security and Communication Networks  
suitable for multiserver architecture and robust against various attacks.  ...  At ICCCS'17, Wu and Xu proposed an efficient smart-card-based password authentication scheme for cloud computing environments to cope with the vulnerabilities in Jiang et al.'s scheme.  ...  Authentication Phase. This phase is to achieve mutual authentication and key agreement among 𝑈 𝑖 , 𝑆 𝑚 , and 𝐶𝑆. Step 1.  ... 
doi:10.1155/2019/2516963 fatcat:zwafpmw5xbavtezfwnorij5io4

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Akasha Shafiq, Muhammad Faizan Ayub, Khalid Mahmood, Mazhar Sadiq, Saru Kumari, Chien-Ming Chen
2020 Journal of Sensors  
In this article, we introduce a lightweight identity-based remote user authentication and key agreement scheme for IoT environment that enables secure access to IoT services.  ...  The rapid advancement in the field of wireless sensor and cellular networks have established a rigid foundation for the Internet of Things (IoT).  ...  Yang and Chang [36] proposed an identity-based authentication key agreement (AKA) scheme using elliptic curve cryptosystem (ECC) for mobile devices.  ... 
doi:10.1155/2020/8829319 fatcat:ccgoy2wuwrf4revmmuzy3rulry
« Previous Showing results 1 — 15 out of 26 results