Abstract
A mutual authentication scheme and secret key exchange based on combined secret key method is proposed. Use hardware including smart card, encryption cards or encryption machine to perform encryption and decryption. Hash function, symmetric algorithm and combined secret key method are applied at client and server. The authentication security is guaranteed due to the properties of hash function, combined secret key method and one-time mutual authentication token generation method. Mutual authentication based on smart card and one-time combined secret key can avoid guessing attack and replay attack. The mutual authentication method can be applied to cloud based application systems to realize mutual authentication and enhance security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Annual Authenitication Survey. http://cn.safenet-inc.com/news/2014/authentication-survey-2014-reveals-more-enterprises-adopting-multi-factor-authentication/?LangType=2052#sthash.dSnZBDMn.dpuf
Chhabra, R.K., Verma, A.: Strong authentication system along with virtual private network: A secure cloud solution for cloud computing. International Journal of Electronics and Computer Science Engineering. 1(3), 1566–1573 (2012)
Vallabhu, H., Satyanarayana, R.V.: Biometric Authentication as a Service on Cloud: Novel Solution. International Journal of Soft Computing and Engineering (IJSCE) 2(4), 163–165 (2012). ISSN: 2231-2307
Rassan, I.A.L., AlShaher, H.: Securing Mobile Cloud Using Finger Print Authentication. International Journal of Network Security & Its Applications (IJNSA) 5(6), 41–53 (2013)
Emam, A.H.M.: Additional Authentication and Authorization using Registered Email-ID for Cloud Computing. International Journal of Soft Computing and Engineering (IJSCE) 3(2), 110–113 (2013). ISSN: 2231-2307
Singh, M., Singh, S.: Design and Implementation of Multi-tier Authentication Scheme in Cloud. International Journal of Computer Science Issues 9(5), 181–187 (2012). No 2
Nafi, K.W., Kar, T.S., Hoque, S.A., Hashem, M.M.A.: A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture. (IJACSA) International Journal of Advanced Computer Science and Applications 3(10), 181–186 (2012)
Park, Y., Lee, Y.: Group-ID based RFID Mutual Authentication. Advances in Electrical and Computer Engineering 13(4), 9–12 (2013)
Liu, A.-T., Chang, H.K.-C., Lo, Y.-S., Wang, S.-Y.: The Increase of RFID Privacy And Security With Mutual Authentication Mechanism In Supply Chain Management. International Journal of Electronic Business Management 10(1), 1–7 (2012)
Le, X.H., Khalid, M., Sankar, R.: An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare. Journal of Networks 6(3), 355–364 (2011)
Nayak, S.K., Mohapatra, S., Majhi, B.: An Improved Mutual Authentication Framework for Cloud Computing. International Journal of Computer Applications (0975-8887) 52(5), 36–41 (2012)
Li, C.-T.: An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards. In: 2009 Fifth International Conference on Information Assurance and Security, pp. 517–520 (2009)
Baboo, S.S., Gokulraj, K.: An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks. I. J. Computer Network and Information Security 4, 30–38 (2012). MECS
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhao, G., Du, L., Li, Y., Xu, G. (2015). Mutual Authentication Protocol Based on Smart Card and Combined Secret Key Encryption. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-20472-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-20471-0
Online ISBN: 978-3-319-20472-7
eBook Packages: Computer ScienceComputer Science (R0)