The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access ...The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.展开更多
Mobile IP is an IP layer mobility protocol which allows mobile nodes to remain reachable while moving around in the Internet.In the current IETF Mobile IP specifications,when a mobile node roams, its location movement...Mobile IP is an IP layer mobility protocol which allows mobile nodes to remain reachable while moving around in the Internet.In the current IETF Mobile IP specifications,when a mobile node roams, its location movement can be tracked by simply monitoring the IP addresses in IP packets.Recently, the issue of protecting location information in Mobile IP has received increasing attention,especially within the IETF and the 3GPP standard bodies.In this paper we propose a technique for hiding a mobile node’s location movement information from eavesdroppers during route optimization and as well as from its correspondent node during reverse tunneling. The proposed technique is highly efficient and fully compatible with the base Mobile IPv6 operation.展开更多
In 2010,Hwang,et al.proposed a 'DoS-resistant ID-based password authentication scheme using smart cards' as an improvement of Kim-Lee-Yoo's 'ID-based password authentication scheme'.In this paper,w...In 2010,Hwang,et al.proposed a 'DoS-resistant ID-based password authentication scheme using smart cards' as an improvement of Kim-Lee-Yoo's 'ID-based password authentication scheme'.In this paper,we cryptanalyze Hwang,et al.'s scheme and point out that the revealed session key could threat the security of the scheme.We demonstrate that extracting information from smart cards is equal to knowing the session key.Thus known session key attacks are also effective under the as-sumption that the adversary could obtain the information stored in the smart cards.We proposed an improved scheme with security analysis to remedy the weaknesses of Hwang,et al.'s scheme.The new scheme does not only keep all the merits of the original,but also provides several additional phases to improve the flexibility.Finally,the improved scheme is more secure,efficient,practical,and convenient,because elliptic curve cryptosystem is introduced,the expensive smart cards and synchronized clock system are replaced by mobile devices and nonces.展开更多
With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an ever ncreas...With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an ever ncreasing role in e-commerce. This is especially true of mobile payments, which are attracting increasing attention However, the occurrence of many traditional financial mishaps has exposed the challenges inherent in online authentication technology that is based on traditional modes of realizing the healthy and stable development of mobile payment. In addition, this technology ensures user account security and privacy. In this paper, we propose a Secure Mutual Authentication Protocol (SMAP) based on the Universal 2nd Factor (U2F) protocol for mobile payment. To guarantee reliable service, we use an asymmetric cryptosystem for achieving mutual authentication between the server and client, which can resist fake servers and forged terminals. Compared to the modes currently used, the proposed protocol strengthens the security of user account information as well as individual privacy throughout the mobile-payment transaction process. Practical application has proven the security and convenience of the proposed protoco展开更多
The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on M...The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.展开更多
基于AAA(Authentication,Authorization and Accounting)的移动IP协议被用于解决移动IP的认证、授权及计费问题,但在切换时存在较大的时延。本文在分析现有的基于AAA的移动IP基本模型的基础上,提出了一种改进方案。该改进方案通过减少...基于AAA(Authentication,Authorization and Accounting)的移动IP协议被用于解决移动IP的认证、授权及计费问题,但在切换时存在较大的时延。本文在分析现有的基于AAA的移动IP基本模型的基础上,提出了一种改进方案。该改进方案通过减少外地网络与家乡网络之间交换的认证注册消息数量,明显提高了切换的效率。同时通过采用公钥和对称密钥相结合的加密及认证方法,使得该方案具有安全、快速、成本低和扩展性好等优点,较好地满足了移动IP的要求。展开更多
文摘The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.
基金partly funded by Office of Research, Singapore Management University and Institute for Infocomm Research
文摘Mobile IP is an IP layer mobility protocol which allows mobile nodes to remain reachable while moving around in the Internet.In the current IETF Mobile IP specifications,when a mobile node roams, its location movement can be tracked by simply monitoring the IP addresses in IP packets.Recently, the issue of protecting location information in Mobile IP has received increasing attention,especially within the IETF and the 3GPP standard bodies.In this paper we propose a technique for hiding a mobile node’s location movement information from eavesdroppers during route optimization and as well as from its correspondent node during reverse tunneling. The proposed technique is highly efficient and fully compatible with the base Mobile IPv6 operation.
基金Supported by the Natural Science Foundation of Shandong Province (No. Y2008A29)the Science and Technique Foundation of Shandong Province (No. 2008GG30009008)
文摘In 2010,Hwang,et al.proposed a 'DoS-resistant ID-based password authentication scheme using smart cards' as an improvement of Kim-Lee-Yoo's 'ID-based password authentication scheme'.In this paper,we cryptanalyze Hwang,et al.'s scheme and point out that the revealed session key could threat the security of the scheme.We demonstrate that extracting information from smart cards is equal to knowing the session key.Thus known session key attacks are also effective under the as-sumption that the adversary could obtain the information stored in the smart cards.We proposed an improved scheme with security analysis to remedy the weaknesses of Hwang,et al.'s scheme.The new scheme does not only keep all the merits of the original,but also provides several additional phases to improve the flexibility.Finally,the improved scheme is more secure,efficient,practical,and convenient,because elliptic curve cryptosystem is introduced,the expensive smart cards and synchronized clock system are replaced by mobile devices and nonces.
基金supported by the National Key R&D Program of China (No. 2017YFB0802600)the National Natural Science Foundation of China (Nos. 61772403 and U1401251)+1 种基金the Natural Science Basic Research Plan in Shaanxi Province of China (No. 2017JM6004)National 111 Program of China (Nos. B16037 and B08038)
文摘With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an ever ncreasing role in e-commerce. This is especially true of mobile payments, which are attracting increasing attention However, the occurrence of many traditional financial mishaps has exposed the challenges inherent in online authentication technology that is based on traditional modes of realizing the healthy and stable development of mobile payment. In addition, this technology ensures user account security and privacy. In this paper, we propose a Secure Mutual Authentication Protocol (SMAP) based on the Universal 2nd Factor (U2F) protocol for mobile payment. To guarantee reliable service, we use an asymmetric cryptosystem for achieving mutual authentication between the server and client, which can resist fake servers and forged terminals. Compared to the modes currently used, the proposed protocol strengthens the security of user account information as well as individual privacy throughout the mobile-payment transaction process. Practical application has proven the security and convenience of the proposed protoco
文摘The study on design and implementation of end to end encrypted Short Message Service (SMS) using hybrid cipher algorithm is motivated by high rate of insecurity of data observed during Short Message Service (SMS) on Mobile devices. SMS messages are one of the popular ways of communication. The aim therefore is to design a software for end to end encryption short message service (SMS) that can conceal message while on transit to another mobile device using Hybrid Cipher Algorithm on Android Operating System and implement it for security of mobile SMS. Hybrid encryption incorporates a combination of asymmetric and symmetric encryption to benefit from the strengths of each form of encryption. Various encryption algorithms have been discussed. Secondary sources were employed in gathering useful data. In this research work three methodologies are employed—Structured System Analysis Design Methodology (SSADM), Object Oriented Analysis Design Methodology (OOADM) and prototyping. With the help of the three cryptographic algorithms employed—Message digest 5 (MD5), Blowfish and Rivest-Shamir Adleman (RSA);integrity, confidentiality, authentication and security of messages were achieved. The messages encrypted by developed application are also resistant to brute force attack. The implementing programs were coded in Java.
文摘基于AAA(Authentication,Authorization and Accounting)的移动IP协议被用于解决移动IP的认证、授权及计费问题,但在切换时存在较大的时延。本文在分析现有的基于AAA的移动IP基本模型的基础上,提出了一种改进方案。该改进方案通过减少外地网络与家乡网络之间交换的认证注册消息数量,明显提高了切换的效率。同时通过采用公钥和对称密钥相结合的加密及认证方法,使得该方案具有安全、快速、成本低和扩展性好等优点,较好地满足了移动IP的要求。