Design of USIM-based secure user authentication scheme in a mobile office environment

被引:0
|
作者
Jun-Sub Kim
Jin Kwak
机构
[1] Sungkyunkwan University,IT Convergence Research Institute
[2] Ajou University,Department of Information and Computer Engineering
来源
关键词
User authentication; USIM; Mobile; Formal verification; Security;
D O I
暂无
中图分类号
学科分类号
摘要
In order to spread the scale of the mobile device market rapidly, mobile office applications have been introduced that can be process office work anytime, anywhere. However, the mobile office is vulnerable to several security threats that can occur over wireless networks, which can result in illegal enterprise information access and disclosure because of the openness and portability of the mobile device. Therefore, the mobile office environment must prevent unauthorized service and resource access, and a user authentication scheme is needed to mitigate the potential security vulnerabilities. In this paper, we propose a USIM-based secure user authentication scheme for a mobile office environment. The proposed scheme uses the USIM to securely share secret information for authentication between the mobile user and the server, and the mobile device can perform re-authentication to the server through the re-authentication phase in the event of handover. Moreover, the proposed authentication scheme is specified using Casper and is verified the security using the CasperFDR and FDR tool.
引用
收藏
页码:14541 / 14556
页数:15
相关论文
共 50 条
  • [1] Design of USIM-based secure user authentication scheme in a mobile office environment
    Kim, Jun-Sub
    Kwak, Jin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14541 - 14556
  • [2] A USIM-Based Uniform Access Authentication Framework in Mobile Communication
    Xinghua Li
    Jianfeng Ma
    YoungHo Park
    Li Xu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [3] A USIM-Based Uniform Access Authentication Framework in Mobile Communication
    Li, Xinghua
    Ma, Jianfeng
    Park, YoungHo
    Xu, Li
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [4] A user authentication scheme based on fingerprint and USIM card
    Huang, Xian-ge
    Shen, Lei
    Feng, Yan-hong
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1261 - +
  • [5] Security scheme for high capacity USIM-based services
    Korea University, Center for Information and Security Technologies ,, Anam Dong, Sungbuk Gu, Seoul, Korea, Republic of
    [J]. Int. J. Secur. Appl., 2013, 4 (433-444):
  • [6] Security Scheme for High Capacity USIM-based Services
    Jeong, Eun Su
    Kim, Bum Han
    Lee, Dong Hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 433 - 444
  • [7] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [8] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [9] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [10] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE ACCESS, 2017, 5 : 25808 - 25825