Preventing delegation-based mobile authentications from man-in-the-middle attacks

被引:7
|
作者
Lu, Jian-Zhu [1 ]
Zhou, Jipeng [1 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou 510630, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Mobile communication; Mutual authentication; Elliptic curve cryptosystem; WIRELESS NETWORKS; PROTOCOL; COMMUNICATION; ENCRYPTION; SERVICES;
D O I
10.1016/j.csi.2011.10.014
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an approach of mutual authentication and key exchange for mobile access, based on the trust delegation and message authentication code, is developed, and a novel nonce-based authentication approach is presented. The proposed protocols can effectively defend all known attacks to mobile networks including the denial-of-service attacks and man-in-the-middle attacks. In particular, in contrast to some previous work, our design gives users a chance to set a session key according to users' will, and does not require a mobile user to compute useless hash key chains in the face of HLR-online authentication failures or run the initial authentication protocol before HLR-offline authentication. Moreover, our design enjoys both computation efficiency and communication efficiency as compared to known mobile authentication schemes. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:314 / 326
页数:13
相关论文
共 50 条
  • [1] Mobile Authentication Secure Against Man-In-The-Middle Attacks
    Bicakci, Kemal
    Unal, Devrim
    Ascioglu, Nadir
    Adalier, Oktay
    [J]. 9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
  • [2] Enhanced ARP: Preventing ARP Poisoning-Based Man-in-the-Middle Attacks
    Nam, Seung Yeob
    Kim, Dongwon
    Kim, Jeongeun
    [J]. IEEE COMMUNICATIONS LETTERS, 2010, 14 (02) : 187 - 189
  • [3] Taxonomy of Man-in-the-Middle Attacks on HTTPS
    Stricot-Tarboton, Shaun
    Chaisiri, Sivadon
    Ko, Ryan K. L.
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 527 - 534
  • [4] Impact of Man-In-The-Middle Attacks on Ethereum
    Ekparinya, Parinya
    Gramoli, Vincent
    Jourjon, Guillaume
    [J]. 2018 IEEE 37TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2018, : 11 - 20
  • [5] Monitoring WLANs for man-in-the-middle attacks
    Harshini, NL
    Sridhar, G
    Sridhar, V
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2004, : 210 - 215
  • [6] Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    [J]. SYMMETRY-BASEL, 2022, 14 (08):
  • [7] Resilient Control in the Presence of Man-in-the-Middle Attacks
    Griffioen, Paul
    Romagnoli, Raffaele
    Krogh, Bruce H.
    Sinopoli, Bruno
    [J]. 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 4553 - 4560
  • [8] Revisiting man-in-the-middle attacks against HTTPS
    Kampourakis, Vyron
    Kambourakis, Georgios
    Chatzoglou, Efstratios
    Zaroliagis, Christos
    [J]. Network Security, 2022, 2022 (03)
  • [9] Detecting Man-in-the-Middle Attacks by Precise Timing
    Aziz, Benjamin
    Hamilton, Geoff
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 81 - +
  • [10] Discovering man-in-the-middle attacks in authentication protocols
    Guha, Ratan K.
    Furqan, Zeeshan
    Muhammad, Shahabuddin
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3654 - 3660