Abstract
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Similar content being viewed by others
References
Peng, K., Yang, J., and Zheng, J., An identity authentication system based on mobile phone token. Proc. Netw. Infrastruct. Digit. Content Beijing. 570–575, 2009.
Van Thanh, D., Jonvik, T., Boning, F., Van Thuan, D., and Jorstad, I., Simple strong authentication for internet applications using mobile phones. Proc. Glob. Telecommun. Conf. New Orleans. 1–5, 2008.
Jonvik, T., Jorstad, I., and van Thanh, D., Strong authentication with mobile phone as security token. Proc. Mob. Adhoc Sen. Syst. Macao. 777–782, 2009.
Me, G., Pirro, D., and Sarrecchia, R., A mobile based approach to strong authentication on Web. Proc. Comput. Glob. Inf. Technol. Bucharest. 67–72, 2006.
He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3):367–374, 2011.
Chen, Y. L., and Cheng, C. M., Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks. Eng. Comput. 31(2):317–330, 2014.
Weaver, A. C., Secure sockets layer. Computer. 9(4):88–90, 2006.
Bisel, L. D., The role of SSL in cybersecurity. IT Prof. 9(2):22–25, 2007.
Mizuno, S., Takahashi, K., and Yamada, K., Authentication using multiple communication channels. Proc. ACM Workshop Digit. Identity Manag. Fairfax. 54–62, 2005.
Chang, C. C., Chiu, Y. C., and Lee, C. Y., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4):611–618, 2009.
Enck, W., McDaniel, P., and Ongtang, M., Understanding Android security. Secur. Priv. 7(1):50–57, 2009.
PHP: Session Functions. The PHP Group. Available via http://php.net/manual/en/function.session-id.php
Chen, C. L., A secure and traceable E-DRM system based on mobile device. Exp. Syst. Appl. 35(3):878–886, 2008.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Mobile Systems.
Rights and permissions
About this article
Cite this article
Chen, YL., Liau, RH. & Chang, LY. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks. J Med Syst 40, 26 (2016). https://doi.org/10.1007/s10916-015-0360-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-015-0360-x