Design of USIM-based secure user authentication scheme in a mobile office environment

被引:0
|
作者
Jun-Sub Kim
Jin Kwak
机构
[1] Sungkyunkwan University,IT Convergence Research Institute
[2] Ajou University,Department of Information and Computer Engineering
来源
关键词
User authentication; USIM; Mobile; Formal verification; Security;
D O I
暂无
中图分类号
学科分类号
摘要
In order to spread the scale of the mobile device market rapidly, mobile office applications have been introduced that can be process office work anytime, anywhere. However, the mobile office is vulnerable to several security threats that can occur over wireless networks, which can result in illegal enterprise information access and disclosure because of the openness and portability of the mobile device. Therefore, the mobile office environment must prevent unauthorized service and resource access, and a user authentication scheme is needed to mitigate the potential security vulnerabilities. In this paper, we propose a USIM-based secure user authentication scheme for a mobile office environment. The proposed scheme uses the USIM to securely share secret information for authentication between the mobile user and the server, and the mobile device can perform re-authentication to the server through the re-authentication phase in the event of handover. Moreover, the proposed authentication scheme is specified using Casper and is verified the security using the CasperFDR and FDR tool.
引用
收藏
页码:14541 / 14556
页数:15
相关论文
共 50 条
  • [21] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [22] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [23] A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)
  • [24] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Saru Kumari
    Fan Wu
    Shehzad Ashraf Chaudhry
    R. Niranchana
    [J]. Mobile Networks and Applications, 2019, 24 : 1046 - 1062
  • [25] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 1046 - 1062
  • [26] A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices
    Yoon, Eun-Jim
    Yoo, Kee-Young
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 612 - +
  • [27] A secure image-based authentication scheme for mobile devices
    Li, Z
    Sun, QB
    Lian, Y
    Giusto, DD
    [J]. ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 751 - 760
  • [28] Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC
    Wang, Ding
    Ma, Chun-guang
    [J]. INFORMATION FUSION, 2013, 14 (04) : 498 - 503
  • [29] Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1118 - 1123
  • [30] Efficient and secure source authentication scheme for multicast user authentication
    Jeong, Yoon-su
    Lee, Sang-hyuk
    Shin, Seung-soo
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2013, 20 (10) : 2741 - 2746