Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks

Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks

Prajnamaya Dass, Pranay Kumar Saha, Hari Om
Copyright: © 2016 |Volume: 12 |Issue: 2 |Pages: 34
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781466689336|DOI: 10.4018/IJBDCN.2016070103
Cite Article Cite Article

MLA

Dass, Prajnamaya, et al. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks." IJBDCN vol.12, no.2 2016: pp.28-61. http://doi.org/10.4018/IJBDCN.2016070103

APA

Dass, P., Saha, P. K., & Om, H. (2016). Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks. International Journal of Business Data Communications and Networking (IJBDCN), 12(2), 28-61. http://doi.org/10.4018/IJBDCN.2016070103

Chicago

Dass, Prajnamaya, Pranay Kumar Saha, and Hari Om. "Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks," International Journal of Business Data Communications and Networking (IJBDCN) 12, no.2: 28-61. http://doi.org/10.4018/IJBDCN.2016070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Wireless technology is widely spread everywhere in the real world and has a biggest contribution to mankind. However, with the vitality of wireless architectures, security protocols are vulnerable to attackers outside the system, failure in wireless connectivity and machine failures. Protocols must be streamlined to combat with these abnormal conditions. In this paper, the authors provide a review of an existing protocol by Lee et al. They found that the protocol proposed by Lee et al., Enhanced two factor key exchange protocol in public wireless LANs is vulnerable to traceable attack. It is a serious type of attack where the attacker can target a particular user/client. To ensure security, the authors propose an improved scheme which anonymously provides secure authentication satisfying synchronization, untraceability of user and resists common attacks in a wireless network. As most of the real time security protocols use bio-metric based authentication schemes, they also propose a smartcard based secure authentication scheme for wireless networks. Their proposed schemes are proved safe under the formal security analysis of BAN logic. Both of their protocols are simulated using Automated Validation of Internet Security Protocols and Applications (AVISPA). The simulation of their protocols under On-the-Fly-Model-Checker (OFMC) and Constant Logic based Attack Searcher (CL-AtSe) models of AVISPA results in a SAFE state. The authors have compared their proposed schemes against some of the recently proposed wireless authentication schemes in terms of attack resistivity and operational cost. Experimental results elicit a significant improvement over the existing schemes with low cost. Proposed untraceable, synchronized schemes can be applied for authentication purposes in public wireless networks, client server authentication system etc. with effective cost.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.