A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication

@article{Amin2017ARA,
  title={A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication},
  author={Ruhul Amin and SK Hafizul Islam and Pandi Vijayakumar and Muhammad Khurram Khan and Victor I. C. Chang},
  journal={Multimedia Tools and Applications},
  year={2017},
  volume={77},
  pages={11041-11066}
}
Remote mutual authentication provides an efficient platform through which an user accesses several resources of the remote serve at anytime over insecure channel and makes their life more comfortable. In this context, lot of key agreement methods have been put forward for enhancing securities. Preserving complete security requirements of the authentication scheme are now becoming challenging research. Hsu et al. proposed similar type of work using bilinear pairing for improving the security… Expand
A Secure and Efficient Anonymous User Authentication and Key Agreement Scheme for Global Mobility Networks Based on Bilinear Pairing
  • Mo Jiaqing, Liu Kaiming
  • 2020 IEEE 3rd International Conference on Electronic Information and Communication Technology (ICEICT)
  • 2020
With the prompt advancement of wireless network technique, handheld mobile devices like mobile phones are becoming increasingly popular. Secure roaming of mobile devices has become one of the keyExpand
A lightweight authentication and key agreement scheme for Internet of Drones
TLDR
A lightweight AKA scheme in which there are only secure one-way hash function and bitewise XOR operations when drones and users mutually authenticate each other is proposed, which can achieve AKA-security under the random oracle model and withstand various known attacks. Expand
Secure hierarchical authentication protocol in VANET
TLDR
A hierarchical revocable authentication protocol based on the self-certified public keys and Schnorr signatures is proposed for VANET, which greatly saves computation resources and satisfies the well-known security requirements. Expand
Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card
TLDR
The acceptance of the proposed automated user identification and authentication model is authorized using a modified technology acceptance model and the result proves that there exists a strong relationship between the perceived usefulness of items and the Attribute of Use (AOU). Expand
On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks
TLDR
This paper presents a secure and efficient authentication protocol based on three-factor authentication by taking advantage of biometrics and uses a honey_list technique to protect against brute force and stolen smartcard attacks. Expand
A Sink Node Trusted Access Authentication Protocol for Mobile Wireless Sensor Network Using Block Cipher Algorithm Based on IoT
TLDR
A Sink node trusted access authentication protocol using packet cipher algorithm for mobile WSN is proposed based on the Internet of Things (IoT) environment and the correctness and security of the proposed protocol have been proved by the verification experiments. Expand
One round cipher algorithm for multimedia IoT devices
TLDR
The speed, simplicity and high-security level, in addition to low error propagation, make of this approach a good encryption candidate for multimedia IoT devices. Expand
Blockchain-based decentralized content trust for docker images
TLDR
This paper addresses Docker’s vulnerability towards Denial-of-Service (DoS) attacks, and proposes a potential solution: blockchain-based Decentralized Docker Trust (DDT). Expand
Calculating the trust of providers through the construction weighted Sec-SLA
TLDR
A calculation model to determine the reliability of a provider based on the solution measures and mitigation of security incidents offered in its service catalog is proposed, as well as the development of an abstract method to support consumers in the definition of weights to be attributed to the architecture, privacy and compliance used in the calculation of trust. Expand
Collusion attacks mitigation in internet of things: a fog based model
TLDR
A model based on Fog Computing infrastructure to keep track of IoT devices and detect collusion attackers and claims that fog layer infrastructure can provide the required resources for the scalability of the model is introduced. Expand
...
1
2
...

References

SHOWING 1-10 OF 49 REFERENCES
A Novel Remote User Authentication Scheme from Bilinear Pairings Via Internet
AbstractRecently, Manik et al. proposed a remote user authentication scheme using bilinear pairings, in which the user can login to a remote system with his own smart card. Some security flaws andExpand
A secure and efficient scheme of remote user authentication based on bilinear pairings
TLDR
This paper proposes a secure and efficient scheme of remote user authentication based on bilinear pairings that achieves the low-computation requirement for smart cards and can construct the complete authentication scheme, including mutual authentication and session key agreement. Expand
An Improved Remote User Authentication Scheme using Bilinear Pairings
TLDR
Some weaknesses in the existing remote user authentication scheme are shown and an improvement is proposed that enables users to choose and change the password without the help of the remote server. Expand
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture
TLDR
By presenting concrete attacks, it is demonstrated that Pippal et al. Expand
Cryptanalysis and an Efficient Secure ID-based Remote User Authentication using Smart Card
TLDR
An efficient secure ID based remote user authentication scheme using smart card based on cryptographic one way hash function that resists all possible attacks and provides better computation and communication cost than Ratan-Sanjay’s scheme published earlier. Expand
An improved bilinear pairing based remote user authentication scheme
TLDR
Both Das et al.'s and Chou et al.'s schemes are insecure against forgery and replay attacks and an improved scheme is proposed that overcomes the security flaws without affecting the merits of the original scheme. Expand
Efficient password authenticated key agreement using bilinear pairings
TLDR
This paper proposes an efficient and flexible password authenticated key agreement scheme using bilinear pairings, which can protect the user's privacy and prevent the offline dictionary attack. Expand
An efficient user authentication and key exchange protocol for mobile client-server environment
TLDR
A new user authentication and key exchange protocol using bilinear pairings for mobile client-server environment is presented and it is demonstrated that the protocol is provably secure against previous attacks. Expand
Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery
In this paper, an efficient and secure strong designated verifier signature with message recovery scheme is presented using elliptic curve and bilinear pairing. In our scheme, the signer implants aExpand
Three Attacks on Jia et al.'s Remote User Authentication Scheme using Bilinear Pairings and ECC
TLDR
This paper points out that the Jia et al. scheme is vulnerable to privileged insider attack, forgery attack and server spoofing attack because it does not provide mutual authentication between the user and the remote server. Expand
...
1
2
3
4
5
...