Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks

People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

[1]  Chin-Chen Chang,et al.  Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..

[2]  Alfred C. Weaver Secure Sockets Layer , 2006, Computer.

[3]  Do Van Thanh,et al.  Simple Strong Authentication for Internet Applications Using Mobile Phones , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[4]  Chun Chen,et al.  A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..

[5]  Patrick D. McDaniel,et al.  Understanding Android Security , 2009, IEEE Security & Privacy Magazine.

[6]  F. Garcia,et al.  Bulk Transfer Capacity Estimation in IPv6 Networks , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).

[7]  Chin-Ling Chen,et al.  A secure and traceable E-DRM system based on mobile device , 2008, Expert Syst. Appl..

[8]  Qiong Pu,et al.  An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[9]  Do Van Thanh,et al.  Strong authentication with mobile phone as security token , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[10]  Young-Long Chen,et al.  Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks , 2014 .

[11]  Larry D. Bisel The Role of SSL in Cybersecutiry , 2007, IT Professional.

[12]  Gianluigi Me,et al.  A mobile based approach to strong authentication on Web , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).

[13]  Kenji Takahashi,et al.  Authentication using multiple communication channels , 2005, DIM '05.

[14]  Yang Jing,et al.  An identity authentication system based on mobile phone token , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.