Authentication Key Exchange Protocals With Two-Factor Authentication

Authors

  • R.Venkata Kishore  PG Scholar, Department of MCA,St. Ann's College of Engineering and Technology, Chirala. Andhra Pradesh, India
  • Dr. R. Murugadoss  Professor, Department of MCA, St. Ann's College of Engineering and Technology, Chirala. Andhra Pradesh, India

Keywords:

AKE Protocol, Keystroke, ECC Algorithm, Multiple Servers.

Abstract

An anonymous two factor AKE scheme enhance the security of managing account administrations. The Elliptic Curve Cryptography [ECC] based session key apportioned the client device for the banking process. Client login stage changes the keystroke esteem and the second check key progressively on the server. This enables a client and a server to verify each other and produce session key for the ensuing communications.

References

  1. V.C.Gungor,and G.P.Hancke."Industrial wireless sensor network:challenger,design principle and technical approaches",IEEE trans.,Ind.Electron.,vol.56,no.10,pp.4258-4265,Oct.2009.
  2. D.Liu,M.C.Lee,and D.Wu,"A Node-to-Node Location Verification Method ,"IEEE Tran. Ind. Electron., vol.1537,May2010.
  3. G.Wang, J.yu, and Q.Xie, "Security analysis of a sing sign-On mechanism for Distributed Computer Network," IEEE Tran.Ind.Inf.,vol.9,no.1,Jan 2013.
  4. L.Barolli and F.Xhafa,"JXTA-OVERLAY:A P2P platform for distributed,collaborative and ubiqiuitous computing," IEEE Trans.Ind.Electron.,n vol.58.,no6,pp.4784-4791,2012.
  5. Y.Huang, W.Lin, and H.Li "Efficient Implementation of RFID Mutual Authentication protocol", IEEE Tran .Ind.Electron.,vol.59,no.12,pp.4784-4791,2012.
  6. B.Wamg and M.Ma,"Aserver independent authentication scheme for RFID system," IEEE Tran.Ind. Inf ., vol8.no.3, pp.689-696, Agu 2012.
  7. M.Hwang, and L.Li ,"A new remote user authentication scheme using smartcards," IEEE Trans. Consum. Electron.,2000,46(1)28-30.
  8. C.Lee, M.Hwang, and I.Liao,"Security enhancement on a new authentication scheme wuth anonymity for wireless environment ," IEEE Trans. Ind. Electron., vol.53, pp.1683-1687. Oct 2006.
  9. J.J.Shen,C.W.Lin, "Amoditify remote user autnetication scheme using smartcard," IEEE Tran, Consum. Electron., 2003,49(2):414-416.
  10. G.Yang ,D.S.Wang and X.Deng,"Two-Factor mutual authentication based on smartcards and password,"Jounal of computer and syatem ,science 74(7):1160-1172,2008.
  11. C,Ma,D.Wang ,and S.Zhoa ,"Security flaws in two improved remotr user authentication schemes using smartcard,"Int.J.Commun.Syst., DOI:10.1002/dac.2468,2012.
  12. D.He, J.Chen, and J.Hu,"Improvement on a smartcard based password authencation scheme," Journal of Internet Technology, vol.13,no.3,pp.405-410,2012.
  13. Ducan S.Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang,"Provably Secure Dynamic ID-based Anonymoustwo –factor Authenticated key Exchange protocol with extended security model," IEEE Transaction on Information Forensics & security ., no.1, Jun.2017.
  14. A.Velanzano, L.Durante, and M.Cheminod, "Review of security issues in industrial network," IEEE Tran.Ind.Inf.,Vol.9,no.1,pp.277-293-2013.
  15. Amin, R., and Biswas, G.P., "DEsine and analysis of bilinear pairing basedutual authentication and key agreement protocol usable in multi-server environment".wirel. pers, commun 1-24,2015.
  16. Amin, R.,and Biswes, G.P.,"An improved rsa based authentication and session key agreement protocal usable in tmis". J.Med.Syst 39(8):79,2015.
  17. S.Bhatt and T.Santhanam, "Keystroke dynamics for biomartic authentication –a survey ", in Int.Conf .on PattenRecognition Infirmatics and mobile Engineering .2013 ,pp.17-23.
  18. K.S.killourhy," A science understanding of keystroke dynamics" Ph.D.disseration.Canegie Mellon University, Jan 2012.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
R.Venkata Kishore, Dr. R. Murugadoss, " Authentication Key Exchange Protocals With Two-Factor Authentication , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.1339-1342, January-February-2018.