An Efficient and More Secure Id- Based Mutual Authentication Scheme Based on Ecc for Mobile Devices
نویسندگان
چکیده
Mobile services are spread throughout the wireless network and are one of the crucial components needed for various applications and services. However, the security of mobile communication has topped the list of concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication. Currently available network security mechanisms are inadequate; hence there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism. Traditionally, the security services have been provided by cryptography. Recently, techniques based on elliptic curve cryptography (ECC) have demonstrated the feasibility of providing computer security services efficiently on mobile platforms. Islam and Biswas have proposed a more efficient and secure ID-based system for mobile devices on ECC to enhance security for authentication with key agreement system. They claimed that their system truly is more secure than previous ones and it can resist various attacks. However, it is true because their system is vulnerable to known session-specific temporary information attack, and the other system is denial of service resulting from leaking server's database. Thus, the paper presents an improvement to their system in order to isolate such problems.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملAn Efficient and Secure ID-Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices
Mobile devices (e.g., cell phone, PDA and notebook PC) have gained increasingly popularity due to their portability nature. People use these small mobile devices to accomplish the electronic transactions anytime and anywhere. Accordingly, it makes human life more convenient.Users can use to access many applications, for example internet banking, online shopping, mobile pay TV, are accomplished ...
متن کاملSecurity and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
With the rapid development of wireless communication technologies, mobile networks will enable users to use personal mobile devices to access various network information services at anytime and anyplace. Recently, Lu et al. proposed a dynamic ID based mutual authentication and key agreement scheme using elliptic curve cryptography (ECC) which attempts to support better security properties and r...
متن کاملAn Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices
Recently, Islam and Biswas proposed an efficient and secure ID-based remote mutual authentication with key agreement scheme. We have analyzed the security and performance of Islam and Biswas’s scheme and showed that their scheme has some pitfalls. In order to solve these problems, we have constructed an enhanced ECC remote mutual authentication with key agreement scheme and proven that the prop...
متن کاملComments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment
In 2011, Debiao et al. proposed an ID-based remote mutual authentication with key agreement scheme on ECC for mobile client–server environment [H. Debiao, C. Jianhua, H. Jin: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security, Information Fusion, 2011]. They claimed their scheme provides remote mutual authentication w...
متن کامل