A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users

نویسندگان

  • Khalid Waleed Hussein
  • Ramlan Mahmod
  • Taufik Abdullah
چکیده

Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive information can lead to loss of clients in the banking sector or threaten national security. Access to sensitive information starts with e-authentication. Most authentication systems are designed for authenticated users only. However, the user is not the only party that needs to be authenticated to ensure the security of transactions on the Internet. Existing onetime password (OTP) mechanism cannot guarantee non-repudiation and fail to guarantee reuse of a stolen device, which is used in authentication. A novel authentication scheme based on OTP is presented in this paper. This paper proposes a secure multi-factor electronic authentication mechanism. This mechanism is intended to authenticate both the user and the mobile device of the user to ensure non-repudiation and protect the integrity of the OTP against adversarial attacks. The proposed mechanism can detect whether the mobile device is in the hands of the rightful owner before the OTP is sent to the user. The system requires each user to have a unique phone number and a unique mobile device (unique International Mobile Equipment Identity (IMEI)), in addition to an ID card number. The proposed system can ensure that the user who misuses the system becomes liable for the act committed. Therefore, the proposed system can be used in e-banking, egovernment, and ecommerce systems, among other areas requiring high-security guarantees. KeywordSecurity; non-repudiation; multi factor authentication; IMEI; authenticate mobile device; nested multi factor authentication Khalid Waleed Hussein et al, International Journal of Computer Science and Mobile Computing Vol.2 Issue. 7, July2013, pg. 396-405 © 2013, IJCSMC All Rights Reserved 397

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Biometric Based User Authentication Using Smart Card

Remote user authentication is one of the major issues in the rapid growing internet era. In this paper we propose a biometric based remote user authentication scheme using smart cards. The existing methods failed to be safe in remote user authentication as the secret values in either end of the communication could be guessed by the intruder. In our scheme we introduce an addition security at th...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

New Nominative Proxy Signature Scheme for Mobile Communication

Recently, Park and Lee [6] proposed the nominative proxy signature scheme for mobile communication. In [6], they argued that their scheme satisfies the following security requirements: user anonymity, authentication and non-repudiation. However, in this paper, we show that their scheme does not satisfy the non-repudiation among their security requirements. And then we propose a new nominative p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013