Design of USIM-based secure user authentication scheme in a mobile office environment

被引:0
|
作者
Jun-Sub Kim
Jin Kwak
机构
[1] Sungkyunkwan University,IT Convergence Research Institute
[2] Ajou University,Department of Information and Computer Engineering
来源
关键词
User authentication; USIM; Mobile; Formal verification; Security;
D O I
暂无
中图分类号
学科分类号
摘要
In order to spread the scale of the mobile device market rapidly, mobile office applications have been introduced that can be process office work anytime, anywhere. However, the mobile office is vulnerable to several security threats that can occur over wireless networks, which can result in illegal enterprise information access and disclosure because of the openness and portability of the mobile device. Therefore, the mobile office environment must prevent unauthorized service and resource access, and a user authentication scheme is needed to mitigate the potential security vulnerabilities. In this paper, we propose a USIM-based secure user authentication scheme for a mobile office environment. The proposed scheme uses the USIM to securely share secret information for authentication between the mobile user and the server, and the mobile device can perform re-authentication to the server through the re-authentication phase in the event of handover. Moreover, the proposed authentication scheme is specified using Casper and is verified the security using the CasperFDR and FDR tool.
引用
收藏
页码:14541 / 14556
页数:15
相关论文
共 50 条
  • [41] Mobile Terminal User Authentication Scheme Based on Dynamic Gesture
    Zhiping Zhou
    Minmin Miao
    Ziwen Sun
    [J]. 2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 3902 - 3907
  • [42] A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN
    Sarvabhatla, Mrudula
    Vorugunti, Chandra Sekhar
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 367 - 372
  • [43] Secure Dynamic Identity-Based Remote User Authentication Scheme
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 224 - 235
  • [44] SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY
    Li, Chun-Ta
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (02): : 157 - 162
  • [45] A secure and efficient scheme of remote user authentication based on bilinear pairings
    Liao, Yi-Pin
    Wang, Shuenn-Shyang
    [J]. TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 920 - +
  • [46] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [47] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492
  • [48] User authentication in mobile computing environment
    Takubo, A
    Ishikawa, M
    Watanabe, T
    Soga, M
    Mizuno, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (07) : 1288 - 1298
  • [49] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [50] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES
    Wang, Jian
    Jiang, Nan
    [J]. PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +