Skip to main content
Top
Published in: Journal of Medical Systems 1/2016

01-01-2016 | Mobile Systems

Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks

Authors: Young-Long Chen, Ren-Hau Liau, Liang-Yu Chang

Published in: Journal of Medical Systems | Issue 1/2016

Login to get access

Abstract

People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Literature
1.
go back to reference Peng, K., Yang, J., and Zheng, J., An identity authentication system based on mobile phone token. Proc. Netw. Infrastruct. Digit. Content Beijing. 570–575, 2009. Peng, K., Yang, J., and Zheng, J., An identity authentication system based on mobile phone token. Proc. Netw. Infrastruct. Digit. Content Beijing. 570–575, 2009.
2.
go back to reference Van Thanh, D., Jonvik, T., Boning, F., Van Thuan, D., and Jorstad, I., Simple strong authentication for internet applications using mobile phones. Proc. Glob. Telecommun. Conf. New Orleans. 1–5, 2008. Van Thanh, D., Jonvik, T., Boning, F., Van Thuan, D., and Jorstad, I., Simple strong authentication for internet applications using mobile phones. Proc. Glob. Telecommun. Conf. New Orleans. 1–5, 2008.
3.
go back to reference Jonvik, T., Jorstad, I., and van Thanh, D., Strong authentication with mobile phone as security token. Proc. Mob. Adhoc Sen. Syst. Macao. 777–782, 2009. Jonvik, T., Jorstad, I., and van Thanh, D., Strong authentication with mobile phone as security token. Proc. Mob. Adhoc Sen. Syst. Macao. 777–782, 2009.
4.
go back to reference Me, G., Pirro, D., and Sarrecchia, R., A mobile based approach to strong authentication on Web. Proc. Comput. Glob. Inf. Technol. Bucharest. 67–72, 2006. Me, G., Pirro, D., and Sarrecchia, R., A mobile based approach to strong authentication on Web. Proc. Comput. Glob. Inf. Technol. Bucharest. 67–72, 2006.
5.
go back to reference He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3):367–374, 2011.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3):367–374, 2011.CrossRef
6.
go back to reference Chen, Y. L., and Cheng, C. M., Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks. Eng. Comput. 31(2):317–330, 2014.CrossRef Chen, Y. L., and Cheng, C. M., Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks. Eng. Comput. 31(2):317–330, 2014.CrossRef
7.
8.
go back to reference Bisel, L. D., The role of SSL in cybersecurity. IT Prof. 9(2):22–25, 2007.CrossRef Bisel, L. D., The role of SSL in cybersecurity. IT Prof. 9(2):22–25, 2007.CrossRef
9.
go back to reference Mizuno, S., Takahashi, K., and Yamada, K., Authentication using multiple communication channels. Proc. ACM Workshop Digit. Identity Manag. Fairfax. 54–62, 2005. Mizuno, S., Takahashi, K., and Yamada, K., Authentication using multiple communication channels. Proc. ACM Workshop Digit. Identity Manag. Fairfax. 54–62, 2005.
10.
go back to reference Chang, C. C., Chiu, Y. C., and Lee, C. Y., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4):611–618, 2009.CrossRef Chang, C. C., Chiu, Y. C., and Lee, C. Y., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4):611–618, 2009.CrossRef
11.
go back to reference Enck, W., McDaniel, P., and Ongtang, M., Understanding Android security. Secur. Priv. 7(1):50–57, 2009.CrossRef Enck, W., McDaniel, P., and Ongtang, M., Understanding Android security. Secur. Priv. 7(1):50–57, 2009.CrossRef
13.
go back to reference Chen, C. L., A secure and traceable E-DRM system based on mobile device. Exp. Syst. Appl. 35(3):878–886, 2008.CrossRef Chen, C. L., A secure and traceable E-DRM system based on mobile device. Exp. Syst. Appl. 35(3):878–886, 2008.CrossRef
Metadata
Title
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks
Authors
Young-Long Chen
Ren-Hau Liau
Liang-Yu Chang
Publication date
01-01-2016
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 1/2016
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0360-x

Other articles of this Issue 1/2016

Journal of Medical Systems 1/2016 Go to the issue

Transactional Processing Systems

Gastric Cancer Regional Detection System