Skip to main content
Erschienen in: Journal of Medical Systems 1/2016

01.01.2016 | Mobile Systems

Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks

verfasst von: Young-Long Chen, Ren-Hau Liau, Liang-Yu Chang

Erschienen in: Journal of Medical Systems | Ausgabe 1/2016

Einloggen, um Zugang zu erhalten

Abstract

People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Literatur
1.
Zurück zum Zitat Peng, K., Yang, J., and Zheng, J., An identity authentication system based on mobile phone token. Proc. Netw. Infrastruct. Digit. Content Beijing. 570–575, 2009. Peng, K., Yang, J., and Zheng, J., An identity authentication system based on mobile phone token. Proc. Netw. Infrastruct. Digit. Content Beijing. 570–575, 2009.
2.
Zurück zum Zitat Van Thanh, D., Jonvik, T., Boning, F., Van Thuan, D., and Jorstad, I., Simple strong authentication for internet applications using mobile phones. Proc. Glob. Telecommun. Conf. New Orleans. 1–5, 2008. Van Thanh, D., Jonvik, T., Boning, F., Van Thuan, D., and Jorstad, I., Simple strong authentication for internet applications using mobile phones. Proc. Glob. Telecommun. Conf. New Orleans. 1–5, 2008.
3.
Zurück zum Zitat Jonvik, T., Jorstad, I., and van Thanh, D., Strong authentication with mobile phone as security token. Proc. Mob. Adhoc Sen. Syst. Macao. 777–782, 2009. Jonvik, T., Jorstad, I., and van Thanh, D., Strong authentication with mobile phone as security token. Proc. Mob. Adhoc Sen. Syst. Macao. 777–782, 2009.
4.
Zurück zum Zitat Me, G., Pirro, D., and Sarrecchia, R., A mobile based approach to strong authentication on Web. Proc. Comput. Glob. Inf. Technol. Bucharest. 67–72, 2006. Me, G., Pirro, D., and Sarrecchia, R., A mobile based approach to strong authentication on Web. Proc. Comput. Glob. Inf. Technol. Bucharest. 67–72, 2006.
5.
Zurück zum Zitat He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3):367–374, 2011.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3):367–374, 2011.CrossRef
6.
Zurück zum Zitat Chen, Y. L., and Cheng, C. M., Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks. Eng. Comput. 31(2):317–330, 2014.CrossRef Chen, Y. L., and Cheng, C. M., Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks. Eng. Comput. 31(2):317–330, 2014.CrossRef
7.
8.
Zurück zum Zitat Bisel, L. D., The role of SSL in cybersecurity. IT Prof. 9(2):22–25, 2007.CrossRef Bisel, L. D., The role of SSL in cybersecurity. IT Prof. 9(2):22–25, 2007.CrossRef
9.
Zurück zum Zitat Mizuno, S., Takahashi, K., and Yamada, K., Authentication using multiple communication channels. Proc. ACM Workshop Digit. Identity Manag. Fairfax. 54–62, 2005. Mizuno, S., Takahashi, K., and Yamada, K., Authentication using multiple communication channels. Proc. ACM Workshop Digit. Identity Manag. Fairfax. 54–62, 2005.
10.
Zurück zum Zitat Chang, C. C., Chiu, Y. C., and Lee, C. Y., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4):611–618, 2009.CrossRef Chang, C. C., Chiu, Y. C., and Lee, C. Y., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4):611–618, 2009.CrossRef
11.
Zurück zum Zitat Enck, W., McDaniel, P., and Ongtang, M., Understanding Android security. Secur. Priv. 7(1):50–57, 2009.CrossRef Enck, W., McDaniel, P., and Ongtang, M., Understanding Android security. Secur. Priv. 7(1):50–57, 2009.CrossRef
13.
Zurück zum Zitat Chen, C. L., A secure and traceable E-DRM system based on mobile device. Exp. Syst. Appl. 35(3):878–886, 2008.CrossRef Chen, C. L., A secure and traceable E-DRM system based on mobile device. Exp. Syst. Appl. 35(3):878–886, 2008.CrossRef
Metadaten
Titel
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks
verfasst von
Young-Long Chen
Ren-Hau Liau
Liang-Yu Chang
Publikationsdatum
01.01.2016
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 1/2016
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0360-x

Weitere Artikel der Ausgabe 1/2016

Journal of Medical Systems 1/2016 Zur Ausgabe