Welcome to the IKCEST

International Journal of Communication Systems | Vol.31, Issue.31 | | Pages

International Journal of Communication Systems

An ameliorated two‐factor anonymous key exchange authentication protocol for mobile client‐server environment

Khalid Mahmood, Husnain Naqvi, Bander A. Alzahrani, Zahid Mehmood, Azeem Irshad, Shehzad Ashraf Chaudhry  
Abstract

Mobile communication is now an essential part of our day‐to‐day life due to expeditious progress in the industry of information technology. Prior to session key exchange with the corresponding server, a mobile user needs to be authenticated by that server in order to avail its services. Assorted authentication protocols are introduced so far, for authenticating the legitimate mobile users. Very recently, Lu et al introduced a two‐factor scheme for key exchange in the mobile client‐server environment. Lu et al declared that their introduced scheme is anonymous and robust for preventing potential attacks. However, we determined that the scheme of Lu et al is susceptible against server key reveal and smart card stolen attack. Moreover, it is also identified that their scheme is prone to traceability and anonymity violation attacks. Therefore, we proposed an improvement in order to increase the security and effectiveness. The immunity of the proposed protocol and correctness is tested, analyzed, and verified through formal proof of automated tool ProVerif and Burrows‐Abadi‐Needham logic, respectively. Moreover, the security and performance comparison also proved that the improved scheme is robust, efficient, and lightweight.

Original Text (This is the original text for your reference.)

An ameliorated two‐factor anonymous key exchange authentication protocol for mobile client‐server environment

Mobile communication is now an essential part of our day‐to‐day life due to expeditious progress in the industry of information technology. Prior to session key exchange with the corresponding server, a mobile user needs to be authenticated by that server in order to avail its services. Assorted authentication protocols are introduced so far, for authenticating the legitimate mobile users. Very recently, Lu et al introduced a two‐factor scheme for key exchange in the mobile client‐server environment. Lu et al declared that their introduced scheme is anonymous and robust for preventing potential attacks. However, we determined that the scheme of Lu et al is susceptible against server key reveal and smart card stolen attack. Moreover, it is also identified that their scheme is prone to traceability and anonymity violation attacks. Therefore, we proposed an improvement in order to increase the security and effectiveness. The immunity of the proposed protocol and correctness is tested, analyzed, and verified through formal proof of automated tool ProVerif and Burrows‐Abadi‐Needham logic, respectively. Moreover, the security and performance comparison also proved that the improved scheme is robust, efficient, and lightweight.

+More

Cite this article
APA

APA

MLA

Chicago

Khalid Mahmood, Husnain Naqvi, Bander A. Alzahrani, Zahid Mehmood, Azeem Irshad, Shehzad Ashraf Chaudhry,.An ameliorated two‐factor anonymous key exchange authentication protocol for mobile client‐server environment. 31 (31),.

Disclaimer: The translated content is provided by third-party translation service providers, and IKCEST shall not assume any responsibility for the accuracy and legality of the content.
Translate engine
Article's language
English
中文
Pусск
Français
Español
العربية
Português
Kikongo
Dutch
kiswahili
هَوُسَ
IsiZulu
Action
Recommended articles

Report

Select your report category*



Reason*



By pressing send, your feedback will be used to improve IKCEST. Your privacy will be protected.

Submit
Cancel