A secure and privacy-preserving key agreement and mutual authentication scheme

2020 ◽  
Vol 34 (4) ◽  
pp. 201
Author(s):  
Hui Li ◽  
Tao Jing ◽  
Jin Qian
2018 ◽  
Vol 24 (3) ◽  
pp. 1046-1062 ◽  
Author(s):  
Marimuthu Karuppiah ◽  
Ashok Kumar Das ◽  
Xiong Li ◽  
Saru Kumari ◽  
Fan Wu ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2098 ◽  
Author(s):  
Rafael Martínez-Peláez ◽  
Homero Toral-Cruz ◽  
Jorge R. Parra-Michel ◽  
Vicente García ◽  
Luis J. Mena ◽  
...  

With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases.


2007 ◽  
Vol 2 ◽  
pp. 1381-1397
Author(s):  
Chien-Lung Hsu ◽  
Hsiao-Chen Liu ◽  
Ming-Tzu Chou

2017 ◽  
Vol 63 ◽  
pp. 168-181 ◽  
Author(s):  
Fan Wu ◽  
Xiong Li ◽  
Lili Xu ◽  
Saru Kumari ◽  
Marimuthu Karuppiah ◽  
...  

Author(s):  
Saeed Ullah Jan ◽  
Fawad Qayum ◽  
Ajab Khan

The SIP (Session Initiation Protocol) is an application and presentation layer signaling protocol used for initiating, continuing and terminating multimedia session for the end user. It gains much attention of the researchers because it is exposed to several threats and noticed challenging vulnerabilities from time to time. Consequently, the security of SIP is a crucial task and many efforts have been made by different researchers and tried to divert the attention towards its solution. But still, no one claims with conviction about a foolproof secure mechanism for SIP. As users extensively use SIP services, the mutual authentication and key agreement among the participants is an important issue. So, robust authentication and key agreement scheme are mandatory for enhancing security, legitimacy and better complexities. Therefore, we present an improved three-factor authentication scheme that caters all the weakness and known attacks in Mishra et al. scheme. The proposed scheme not only guarantees for security but performance can also be made lightweight. As performance and security contradict each other, the change in one inversely affects the other. The proposed scheme has been analyzed both formally using BAN (Burrows-Abadi-Needham) logic and ProVerif1.93 software verification toolkit, and informally using assumptions which show a delicate balance of security with performance.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 48576-48586
Author(s):  
Subramani Jegadeesan ◽  
Maria Azees ◽  
N. Ramesh Babu ◽  
Umashankar Subramaniam ◽  
J. Dhafer Almakhles

Sign in / Sign up

Export Citation Format

Share Document