1. Ph.D Theses

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/11

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    Item
    Secure Authentication Schemes for Roaming Service in Global Mobility Networks
    (National Institute of Technology Karnataka, Surathkal, 2021) Suvidha, K S.; Madhusudhan, R.
    Distribution of resources and services via open network has become the latest trend in information technology. In the open network, hackers can easily obtain the communication data. Therefore, open network demands the security to protect data and information. Hence, network security is the most important requirement in an open network. In the security system, authentication plays a major role. User authentication is a central component of any security infrastructure. Other security measures depend upon verifying the identity of the sender and receiver of information. Authorization grants privileges based upon identity. Audit trails would not provide accountability without authentication. Confidentiality and integrity are broken if we can't reliably differentiate an authorized entity from an unauthorized entity. Remote user authentication is a mechanism to identify the remote users over an insecure communication network. In remote user authentication, password authentication is the simplest method to authenticate the user. But, the limitations in the password authentication approach leads towards the development of two-factor authentication. There are hundreds of remote user authentication schemes have been proposed by many researchers. None of the schemes achieve all the security goals and many schemes fail to provide security against various attacks. Even though some of the schemes provide the security, they are not efficient in terms of computation and communication cost. Hence, it is necessary to design an efficient and secure authentication scheme. This thesis aims to provide efficient and secure remote user authentication schemes in distributed systems and networks. There are many factors involved in authentication schemes and these factors use the characteristics of the password, smart card and biometric. This research concentrates on cryptanalysis and improvements of the smart card based two-factor remote user authentication schemes. Till date, many smart card based remote user authentication schemes have been proposed. But, every scheme has its security flaws. None of the schemes have succeeded to achieve all the security requirements and goals. Also, many schemes do not provide a strong formal proof to prove the security of the scheme. In this thesis, cryptanalysis of the recently proposed remote user authentication schemes has been done to identify the vulnerabilities. New schemes have been proposed to overcome the identified security flaws. Security of i the proposed schemes has been formally analyzed using BAN logic. Furthermore, the proposed schemes have been simulated using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Through this simulation, it has been ensured that the proposed scheme is secure against active and passive attacks. Using NS 2 simulator, the performance metrics such as throughput, end to end delivery and packet delivery ratio are calculated for the proposed scheme. In the literature study, it is observed that to avoid the replay attack, many remote user authentication schemes depend on clock synchronization. But the clock synchronization has its own disadvantages. Also, the schemes, which are independent of clock synchronization are vulnerable to replay attack. To fix these weaknesses, a novel authentication scheme has been proposed. By employing the Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm, the proposed scheme resists the replay attack. Through the security analysis, it is proved that the scheme achieves all the security goals and resists well-known attacks like insider attack, offline password guessing attack, etc. The proposed scheme security have been analyzed using BAN logic and simulated in AVISPA tool. Through these results, it is ensured that the proposed scheme resists all security attacks. The contributions of this thesis is to the improve the security of the existing authentication schemes. In particular, this research analyzes the Gope and Hwang, Fan Wu et al. and Lee et al.'s schemes. However, the analyzed schemes have many security flaws like fail to provide user anonymity and forward secrecy, vulnerable to the stolen smart card attack, insider attack, guessing attack etc. Based on the analysis, this research proposes improved schemes to overcome the identified weaknesses. Furthermore, a novel authentication scheme has been proposed to resist security attacks. Finally, the thesis presents concluding remarks and discusses the future scope.
  • Thumbnail Image
    Item
    Cryptanalysis and Improvement of Remote User Authentication Schemes in Telecare Medicine Information System
    (National Institute of Technology Karnataka, Surathkal, 2021) Nayak, Chaitanya Sadanand.; Madhusudhan, R.
    The Internet with its high-speed development is making human jobs more easy and less timeconsuming. This has enabled us its usage in all the fields, right from school-going kids to professionals working for Multinational Companies. One can not even imagine a day without the Internet. When this has become the scenario today, personnel from all the fields are trying to make the best out of it and medical health people are also a part of this. The traditional methods of waiting in queues for medical consultancy has been transformed to online consultancy. A patient sitting at one part of world can consult a physician at the other end using the Internet. Medical institutes, researchers in the field are able to work with the required data by obtaining them from the medical servers, where the required information is stored. These topics constitute the connected health care. This is a model for health care that uses technology to provide medical assistance remotely. Telecare Medicine Information System (TMIS) is one such system that supports health care delivery services. The information is stored in a server and since the Internet is open to all, preserving patient’s identity and information is a very important and challenging task. In other words, authentication is most important. In past, this was easy. Two persons would identify each other by visual appearance. But at present, one cannot ’see’ the other in reality. In such case, authentication becomes very complex, specially when the message to be transmitted is confidential. To fulfill this, many authentication schemes using smart cards were and are being proposed. However, many schemes are insecure or they have low efficiency. So, proposing an ideal scheme, which is robust and efficient is the main aim of this research.