首页> 外文期刊>Journal of network and computer applications >Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
【24h】

Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

机译:使用用于多服务器5G网络的自我认证的公钥加密保护双因素轻量级认证协议

获取原文
获取原文并翻译 | 示例

摘要

Recently Ying and Nayak proposed a multi-server supported lightweight authentication protocol for 5G networks and confirmed the security of their protocol against all prominent attacks. Nevertheless, this paper will show certain shortcomings in their protocol, like vulnerability against identity guessing, password guessing, and user impersonation attacks. Additionally, it lacks in rendering strong user anonymity and truly two-factor security. Following the crypt-analysis, we propose an improved multi-server authentication protocol, that resists all recognized attacks, including these traps. The formal analysis using broadly accepted BAN-logic assures that the proposed protocol provides mutual authentication among the user and service-providing server. Additionally, the automated verification using the "Automated Validation of Internet Security Protocols and Applications" (AVISPA) tool asserts that improved protocol is safe toward active attacks. The performance comparison with the Ying-Nayak's protocol is evident that the proposed protocol is efficient concerning computational complexity and communication costs.
机译:最近,Ying和Nayak提出了一个多服务器支持的5G网络的轻量级认证协议,并确认了对所有突出攻击的协议的安全性。尽管如此,本文将在其协议中显示出某些缺点,如对身份猜测,密码猜测和用户模拟攻击的漏洞。此外,它缺乏呈现强大的用户匿名和真正的双因素安全性。在Crypt分析之后,我们提出了一种改进的多服务器认证协议,抵制所有识别的攻击,包括这些陷阱。使用广泛接受的禁令逻辑的正式分析确保所提出的协议在用户和服务提供服务器之间提供相互认证。此外,使用“Internet安全协议和应用程序自动验证”(AVISPA)工具的自动验证断言,改进的协议对主动攻击是安全的。与ying-nayak的协议的性能比较是显而易见的,提出的协议是有效的关于计算复杂性和通信成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号