Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    An Efficient Two Factor Authentication Scheme Providing Secure Communication in Mobile Cloud Computing
    (Institute of Electrical and Electronics Engineers Inc., 2019) Madhusudhan, R.; Suvidha, K.S.
    Integration of mobile networks with cloud computing platform led to development of mobile cloud computing. Since the communication between mobile devices and the cloud computing occur over wireless medium, securing the network becomes paramount. With the thorough literature survey, we found that many two factor authentication schemes proposed so far to preserve user anonymity are vulnerable to various security attacks, they also had shortcomes to achieve security goals. To overcome the issues related to the two factor authentication schemes in mobile cloud computing, a new scheme is proposed. Furthermore, we have simulated the proposed scheme using widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. With the simulated result of the proposed scheme, we show that the proposed scheme is secure against active and passive security attacks. Additionally, the proposed scheme is compared with Gope and Hwang's scheme and other related schemes in terms of computational cost and communication overhead. The proposed scheme is efficient, robust and suitable for practical implementation. © 2019 IEEE.
  • Item
    Secure 4G SEPS-AKA Protocol for UMTS Networks
    (Institute of Electrical and Electronics Engineers Inc., 2020) Suvidha, K.S.; Kamath, S.S.
    User authentication is one of the crucial challenges that has to be addressed in UMTS (Universal Mobile Telecommunications Service) in order to grant the access to the services during handovers. Therefore, to provide the authentication the proposed protocol makes use of the existing Extensible Authentication Protocol (EAP). To provide the authentication in the LTE networks, an authentication framework EAP is used. EAPAKA is one of the methods of EAP framework. EAP-AKA, uses the mechanism Authentication and Key Agreement (AKA). EAPAKA is used in UMTS networks to secure the communication channel. In LTE, this mechanism is called as Evolved Packet System Authentication and Key Agreement (EPS-AKA). Mobile users in LTE networks access the packet data network through Evolved UMTS Terrestrial Radio Access Network (EUTRAN). However, with the thorough literature survey, it is proved that EPS-AKA mechanism is susceptible to the security vulnerabilities such as disclosure of the user identity, Man in the Middle attack and replay attacks. To overcome these security attacks, a new Secure Evolved Packet System (SEPS) protocol has been proposed. The formal security verification of the proposed SEPS protocol using widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool is presented in this paper. In addition to this, the proposed protocol is compared with the other protocols in terms of performance. The proposed SEPS protocol is efficient and robust. This makes the proposed protocol suitable for the practical implementation. © 2020 IEEE.