scholarly journals An IKEv2-based Hybrid Authentication Scheme for Simultaneous Access Network and Home Network Authentication

Author(s):  
MyeongJi KO ◽  
Hyogon KIM ◽  
Sung-Gi MIN
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 166043-166053
Author(s):  
Saiful Azad ◽  
Noor Elya Afiqah Che Nordin ◽  
Nur Nadhirah Ab Rasul ◽  
Mufti Mahmud ◽  
Kamal Z. Zamli

Cryptography ◽  
2021 ◽  
Vol 5 (4) ◽  
pp. 35
Author(s):  
Suvidha K. S. ◽  
Jothi Rangasamy ◽  
Shyam S. Kamath ◽  
Cheng-Chi Lee

The design and implementation of two-factor schemes designed for roaming mobile users for global mobility networks in smart cities requires attention to protect the scheme from various security attacks, such as the replay attack, impersonation attack, man-in-the-middle attack, password-guessing attack and stolen-smart-card attack. In addition to these attacks, the scheme should achieve user anonymity, unlinkability and perfect forward secrecy. In the roaming scenario, as mobile users are connected to the foreign network, mobile users must provide authentication details to the foreign network to which they are connected. The foreign network forwards the authentication messages received from the mobile users to their home network. The home network validates the authenticity of the mobile user. In the roaming scenario, all communication between the three entities is carried over an insecure channel. It is assumed that the adversary has the capabilities to intercept the messages transmitted over an insecure channel. Hence, the authentication scheme designed must be able to resist the above-mentioned security attacks and achieve the security goals. Our proposed scheme ES-HAS (elliptic curve-based secure handover authentication scheme) is a two-factor authentication scheme in which the mobile user possesses the password, and the smart card resists the above-mentioned security attacks. It also achieves the above-mentioned security goals. We also extended our two-factor authentication to a multi-factor authentication scheme using the fingerprint biometric technique. The formal security analysis using BAN logic and the formal security verification of the proposed scheme using the widely accepted AVISPA (automated validation of internet security protocols and applications) tool is presented in this article. In comparison with the related schemes, the proposed scheme is more efficient and robust. This makes the proposed scheme suitable for practical implementation.


2012 ◽  
Vol 569 ◽  
pp. 814-817
Author(s):  
Fei Li ◽  
Ling Tang

Semi-fragile digital watermarking is able to distinguish between accidental attacks and malicious tampering, thus been closely watched in terms of multimedia content authentication. From the perspective of combining digital watermarking technology and palmprint identification, using the hidden and semi-fragile features of digital watermarking and the invariance character of palm information, the two-factor network authentication can be realized. The authentication enhances network security, and it is also a strong authentication scheme. The paper put forward a network authentication method based on palmprint and digital watermarking. The digital watermarking algorithm based on logistic encryption and discrete wavelets transform (DWT). The experimental results show that the algorithm has good semi-fragile feature, it can determine the authenticity of the palmprint image, so the method increases the reliability and efficiency of user authentication.


Symmetry ◽  
2017 ◽  
Vol 9 (12) ◽  
pp. 307 ◽  
Author(s):  
Ya-Fen Chang ◽  
Wei-Liang Tai ◽  
Min-How Hsu

Sign in / Sign up

Export Citation Format

Share Document