Strong Authentication for Internet Mobile Application

被引:0
|
作者
Dostalek, Libor [1 ]
Ledvina, Jiri [2 ]
机构
[1] Univ South Bohemia, Inst Appl Informat, Ceske Budejovice, Czech Republic
[2] Univ W Bohemia, Dept Comp Sci & Engn, Plzen, Czech Republic
关键词
Authentication; Smart Card; Security; Strong Password Authentication; Mobile Application Authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
4G networks to utilize Voice over LTE (VoLTE). VoLTE uses similar authentication mechanisms such as HTTP. It is therefore possible that a web client on the mobile device will use for authentication mechanism originally designed for the VoLTE [10]. I.e. to use the AKA mechanism, which uses the UICC (USIM / ISIM). This mechanism authenticates the user to the mobile network. However, Web applications can provide another entity. This contribution to discuss the possibility of strong authentication into applications running on mobile devices. It deals with the possibility of combining algorithm AKA with other authentication algorithms. Combination of two algorithms will be created strong multifactor authentication, which is suitable for applications demanding high secure authentication such as Internet banking or Internet access to the Government applications.
引用
收藏
页码:23 / 26
页数:4
相关论文
共 50 条
  • [1] Simple Strong Authentication for Internet Applications using Mobile Phones
    van Thanh, Do
    Jonvik, Tore
    Feng, Boning
    van Thuan, Do
    Jorstad, Ivar
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [2] Strong mobile authentication
    Hassinen, M
    Hyppönen, K
    [J]. 2nd International Symposium on Wireless Communications Systems 2005 (ISWCS 2005), 2005, : 96 - 100
  • [3] Secure and Strong Mobile Cloud Authentication
    Hani, Qassim Bani
    Dichter, Julius P.
    [J]. PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 562 - 565
  • [4] Strong Authentication for Mobile Cloud Computing
    Ahmed-Nacer, Anis
    Ahmed-Nacer, Mehdi
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES FOR DISTRIBUTED SYSTEMS (NOTERE), 2016,
  • [5] A Strong Authentication Method for Web/Mobile Services
    Kambou, Samy
    Bouabdallah, Ahmed
    [J]. 2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 124 - 129
  • [6] Strong authentication with mobile phone as security token
    Do Van Thanh
    Jorstad, Ivor
    Jonvik, Tore
    Do Van Thuan
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 1018 - 1023
  • [7] Secure Signature Authentication Algorithm in Mobile Internet
    Sun, Hualin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 31 - 40
  • [8] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    [J]. Zhang, D.-D. (zhdd0411@163.com), 1600, Beijing University of Posts and Telecommunications (20):
  • [9] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG De-dong
    MA Zhao-feng
    NIU Xin-xin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, (01) : 58 - 65
  • [10] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG Dedong
    MA Zhaofeng
    NIU Xinxin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, 20 (01) : 58 - 65