[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks

Published: 01 January 2016 Publication History

Abstract

People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

References

[1]
Peng, K., Yang, J., and Zheng, J., An identity authentication system based on mobile phone token. Proc. Netw. Infrastruct. Digit. Content Beijing. 570---575, 2009.
[2]
Van Thanh, D., Jonvik, T., Boning, F., Van Thuan, D., and Jorstad, I., Simple strong authentication for internet applications using mobile phones. Proc. Glob. Telecommun. Conf. New Orleans. 1---5, 2008.
[3]
Jonvik, T., Jorstad, I., and van Thanh, D., Strong authentication with mobile phone as security token. Proc. Mob. Adhoc Sen. Syst. Macao. 777---782, 2009.
[4]
Me, G., Pirro, D., and Sarrecchia, R., A mobile based approach to strong authentication on Web. Proc. Comput. Glob. Inf. Technol. Bucharest. 67---72, 2006.
[5]
He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3):367---374, 2011.
[6]
Chen, Y. L., and Cheng, C. M., Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks. Eng. Comput. 31(2):317---330, 2014.
[7]
Weaver, A. C., Secure sockets layer. Computer. 9(4):88---90, 2006.
[8]
Bisel, L. D., The role of SSL in cybersecurity. IT Prof. 9(2):22---25, 2007.
[9]
Mizuno, S., Takahashi, K., and Yamada, K., Authentication using multiple communication channels. Proc. ACM Workshop Digit. Identity Manag. Fairfax. 54---62, 2005.
[10]
Chang, C. C., Chiu, Y. C., and Lee, C. Y., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4):611---618, 2009.
[11]
Enck, W., McDaniel, P., and Ongtang, M., Understanding Android security. Secur. Priv. 7(1):50---57, 2009.
[12]
PHP: Session Functions. The PHP Group. Available via http://php.net/manual/en/function.session-id.php
[13]
Chen, C. L., A secure and traceable E-DRM system based on mobile device. Exp. Syst. Appl. 35(3):878---886, 2008.

Cited By

View all
  • (2018)Research on Personalized Exercises and Teaching Feedback Based on Big DataProceedings of the 3rd International Conference on Intelligent Information Processing10.1145/3232116.3232143(166-171)Online publication date: 19-May-2018
  • (2017)Operating Room Efficiency before and after Entrance in a Benchmarking Program for Surgical Process DataJournal of Medical Systems10.1007/s10916-017-0798-041:10(1-8)Online publication date: 1-Oct-2017
  • (2016)Security Recommendations for mHealth AppsJournal of Medical Systems10.1007/s10916-016-0513-640:6(1-13)Online publication date: 1-Jun-2016
  1. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Journal of Medical Systems
        Journal of Medical Systems  Volume 40, Issue 1
        January 2016
        353 pages

        Publisher

        Plenum Press

        United States

        Publication History

        Published: 01 January 2016

        Author Tags

        1. Android
        2. Authentication protocol
        3. Mobile device
        4. SSL
        5. XOR

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 15 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2018)Research on Personalized Exercises and Teaching Feedback Based on Big DataProceedings of the 3rd International Conference on Intelligent Information Processing10.1145/3232116.3232143(166-171)Online publication date: 19-May-2018
        • (2017)Operating Room Efficiency before and after Entrance in a Benchmarking Program for Surgical Process DataJournal of Medical Systems10.1007/s10916-017-0798-041:10(1-8)Online publication date: 1-Oct-2017
        • (2016)Security Recommendations for mHealth AppsJournal of Medical Systems10.1007/s10916-016-0513-640:6(1-13)Online publication date: 1-Jun-2016

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media