Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item Cryptanalysis of remote user authentication scheme with key agreement(Institute of Electrical and Electronics Engineers Inc., 2015) Madhusudan, R.; Valiveti, A.Password authentication with smart card is one of the most convenient and effective two-factor authentication mechanisms for remote systems to assure one communicating party of the legitimacy of the corresponding party by acquisition of corroborative evidence. This technique has been widely deployed for various kinds of authentication applications, such as remote host login, online banking, e-commerce and e-health. Recently, Kumari et al. presented a dynamic-identity-based user authentication scheme with session key agreement. In this research, we illustrate that Kumari et al.'s scheme violates the purpose of dynamic-identity contrary to author's claim. We show that once the smart card of an arbitrary user is lost, messages of all registered users are at risk. Using information from an arbitrary smart card, an adversary can impersonate any user of the system. © 2015 IEEE.Item An enhanced secure authentication scheme with user anonymity in mobile cloud computing(Institute of Electrical and Electronics Engineers Inc., 2017) Madhusudhan, R.; Suvidha, K.S.With the rapid growth and development in cloud computing and mobility, mobile cloud computing has emerged and becomes the trend of future generation computing paradigm. Cloud offers infrastructure, platform and software services to mobile users through mobile network. The key issues in mobile cloud computing are security and privacy. While analysing security and privacy issues in mobile cloud computing, three aspects should be considered they are: mobile terminal, mobile network and the cloud. To address the key issues in mobile cloud computing, we proposed an authentication scheme which will provide security to the messages exchanged between mobile user and the cloud server. Lee at al. have proposed authentication scheme for roaming service in global mobility networks in 2016. In this paper we have reviewed Lee et al.'s scheme and proved that their scheme is vulnerable to replay attack, man in the middle attack and impersonation attack. Moreover their scheme fails to preserve user anonymity, provides no local password verification and could not achieve perfect forward secrecy. Hence an enhanced secure authentication scheme with user anonymity in mobile cloud computing is proposed. Furthermore, the security analysis of the proposed scheme is also presented in this paper. © 2017 IEEE.Item A Secure and Lightweight Authentication Protocol for Mobile User Preserving Privacy in Global Mobility Networks(Elsevier B.V., 2020) Madhusudhan, R.; Suvidha, K.S.In two factor authentication schemes the key factor that has to be addressed is user anonymity and privacy preservation during roaming scenario in GLObal MObility NETwork. While roaming MU needs to access the services of the FA, FA grants the service request only to the authenticated MU. To verify the authenticity of the MU, FA sends the service request of MU to HA. HA verifies the authenticity of the MU after which FA allows the MU to access the services. The entire communication during roaming is carried over insecure channel. Due to this, several security concerns are raised. The main objective in GLOMONET is to secure the channel and the designed scheme should over come all active and passive security attacks. Since, the scheme is designed for mobile networks, it should be light weight with less communication cost, one such scheme has been proposed in this article. The proposed scheme is light weight with less communication cost. Additionally the proposed scheme addresses the active and passive security attacks. The scheme is efficient in terms of computational and communication cost. The proposed scheme is robust and practically implementable. © 2020 The Authors. Published by Elsevier B.V.
