A Security Compliance Based Mobile User Authentication Scheme

2014 ◽  
Vol 989-994 ◽  
pp. 4514-4518
Author(s):  
Yi Fei Yuan ◽  
Lian Zhong Liu ◽  
Chun Yan Han

The BYOD (Bring Your Own Device) scenario puts traditional two-factor authentication into great security challenge. To strengthen the authentication in BYOD scenario, we propose a security compliance based mobile user authentication scheme, which includes a novel calculation method for device identifier, and a fine-grained compliance strategy and its management. The scheme provides a secure authentication mechanism for BYOD scenario and satisfies the requirements of device authentication in mobile user authentication.

IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 7012-7030 ◽  
Author(s):  
Santanu Chatterjee ◽  
Sandip Roy ◽  
Ashok Kumar Das ◽  
Samiran Chattopadhyay ◽  
Neeraj Kumar ◽  
...  

2019 ◽  
Vol 32 (14) ◽  
pp. e3980 ◽  
Author(s):  
Azeem Irshad ◽  
Shehzad Ashraf Chaudhry ◽  
Muhammad Shafiq ◽  
Muhammad Usman ◽  
Muhammad Asif ◽  
...  

2014 ◽  
Vol 631-632 ◽  
pp. 906-909
Author(s):  
Wei Jing Li ◽  
Ping Zhu ◽  
Hua Zhang ◽  
Zheng Ping Jin

Recently, many mobile user authentication schemes with user anonymity for wireless communications have been proposed. In 2012, Li and Lee proposed a novel user authentication and privacy preserving scheme with smart cards for wireless communications. In 2013, Jeon et al. proposed an improved user authentication scheme, and claimed their scheme achieves user anonymity and more efficient. On the basis of their work, we put forward a new user authentication scheme using elliptic curve cryptography with user anonymity for wireless communications. The security and performance analysis show that the new scheme is more secure and efficient for wireless communications.


2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Chorng-Shiuh Koong ◽  
Tzu-I Yang ◽  
Chien-Chao Tseng

With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.


2017 ◽  
Vol 31 (2) ◽  
pp. e3461
Author(s):  
Prosanta Gope ◽  
SK Hafizul Islam ◽  
Mohammad S. Obaidat ◽  
Ruhul Amin ◽  
Pandi Vijayakumar

Sign in / Sign up

Export Citation Format

Share Document