Summary Network security is becoming increasingly vital in today’s fast growing mobile computing environment. Due to constraints in device size and portability, limited processing power, small disk capacity, intermittent network disconnections and frequent switching between network access points have been observed in mobile devices. Thus, protocols for mobile devices must minimize processing overhead to save battery power. In addition, connectivity performance and reliability need to be maintained as in wired environment. In order to achieve this, usage of resource intensive methods for instance public key cryptography and central verification server is foreseen to be reduced. Nonetheless, this poses a security threat to the system. It should be noted that if server security is being easily penetrated especially in the wireless network, the attacker can control the compromised party’s side of the communication channel. In this study, improved reauthentication scheme have been focused on, by performing comprehensive analysis to propose an enhanced authentication protocol which supports fast re-authentication for connection or disconnection of client-server system and other possibility of enhancement in terms of message reduction besides providing more secured solutions through CSP (Communicating Sequential Process) protocol modeling.
[1]
Yanghee Choi,et al.
Pre-Authenticated Fast Handoff in a Public Wireless LAN Based on IEEE 802.1x Model
,
2002,
PWC.
[2]
Sung-Min Lee,et al.
Two-Pass Hybrid Key Distribution Protocol Based on ECC
,
2002,
J. Inf. Sci. Eng..
[3]
D. B. Davis,et al.
Sun Microsystems Inc.
,
1993
.
[4]
Gavin Lowe.
Analyzing a Library of Security Protocols using Casper and FDR
,
1999
.
[5]
Daniel A. Menascé,et al.
The performance of public key-enabled kerberos authentication in mobile computing applications
,
2001,
CCS '01.
[6]
Larry Zhu,et al.
Public Key Cryptography for Initial Authentication in Kerberos (PKINIT)
,
2006,
RFC.
[7]
Gavin Lowe,et al.
Casper: a compiler for the analysis of security protocols
,
1997,
Proceedings 10th Computer Security Foundations Workshop.
[8]
Michael Goldsmith,et al.
Modelling and analysis of security protocols
,
2001
.
[9]
Vipul Gupta,et al.
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography
,
2004,
NDSS.
[10]
Emmanuel Bresson,et al.
Mutual authentication and group key agreement for low-power mobile devices
,
2003,
Comput. Commun..