Authentication Key Exchange Protocals With Two-Factor Authentication
Keywords:
AKE Protocol, Keystroke, ECC Algorithm, Multiple Servers.Abstract
An anonymous two factor AKE scheme enhance the security of managing account administrations. The Elliptic Curve Cryptography [ECC] based session key apportioned the client device for the banking process. Client login stage changes the keystroke esteem and the second check key progressively on the server. This enables a client and a server to verify each other and produce session key for the ensuing communications.
References
- V.C.Gungor,and G.P.Hancke."Industrial wireless sensor network:challenger,design principle and technical approaches",IEEE trans.,Ind.Electron.,vol.56,no.10,pp.4258-4265,Oct.2009.
- D.Liu,M.C.Lee,and D.Wu,"A Node-to-Node Location Verification Method ,"IEEE Tran. Ind. Electron., vol.1537,May2010.
- G.Wang, J.yu, and Q.Xie, "Security analysis of a sing sign-On mechanism for Distributed Computer Network," IEEE Tran.Ind.Inf.,vol.9,no.1,Jan 2013.
- L.Barolli and F.Xhafa,"JXTA-OVERLAY:A P2P platform for distributed,collaborative and ubiqiuitous computing," IEEE Trans.Ind.Electron.,n vol.58.,no6,pp.4784-4791,2012.
- Y.Huang, W.Lin, and H.Li "Efficient Implementation of RFID Mutual Authentication protocol", IEEE Tran .Ind.Electron.,vol.59,no.12,pp.4784-4791,2012.
- B.Wamg and M.Ma,"Aserver independent authentication scheme for RFID system," IEEE Tran.Ind. Inf ., vol8.no.3, pp.689-696, Agu 2012.
- M.Hwang, and L.Li ,"A new remote user authentication scheme using smartcards," IEEE Trans. Consum. Electron.,2000,46(1)28-30.
- C.Lee, M.Hwang, and I.Liao,"Security enhancement on a new authentication scheme wuth anonymity for wireless environment ," IEEE Trans. Ind. Electron., vol.53, pp.1683-1687. Oct 2006.
- J.J.Shen,C.W.Lin, "Amoditify remote user autnetication scheme using smartcard," IEEE Tran, Consum. Electron., 2003,49(2):414-416.
- G.Yang ,D.S.Wang and X.Deng,"Two-Factor mutual authentication based on smartcards and password,"Jounal of computer and syatem ,science 74(7):1160-1172,2008.
- C,Ma,D.Wang ,and S.Zhoa ,"Security flaws in two improved remotr user authentication schemes using smartcard,"Int.J.Commun.Syst., DOI:10.1002/dac.2468,2012.
- D.He, J.Chen, and J.Hu,"Improvement on a smartcard based password authencation scheme," Journal of Internet Technology, vol.13,no.3,pp.405-410,2012.
- Ducan S.Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang,"Provably Secure Dynamic ID-based Anonymoustwo –factor Authenticated key Exchange protocol with extended security model," IEEE Transaction on Information Forensics & security ., no.1, Jun.2017.
- A.Velanzano, L.Durante, and M.Cheminod, "Review of security issues in industrial network," IEEE Tran.Ind.Inf.,Vol.9,no.1,pp.277-293-2013.
- Amin, R., and Biswas, G.P., "DEsine and analysis of bilinear pairing basedutual authentication and key agreement protocol usable in multi-server environment".wirel. pers, commun 1-24,2015.
- Amin, R.,and Biswes, G.P.,"An improved rsa based authentication and session key agreement protocal usable in tmis". J.Med.Syst 39(8):79,2015.
- S.Bhatt and T.Santhanam, "Keystroke dynamics for biomartic authentication –a survey ", in Int.Conf .on PattenRecognition Infirmatics and mobile Engineering .2013 ,pp.17-23.
- K.S.killourhy," A science understanding of keystroke dynamics" Ph.D.disseration.Canegie Mellon University, Jan 2012.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.