An Enhanced Authenticated Key Agreement Protocol with a Neural Network-based Model for Joining-Phase in Mobile Environments

P. E. Abi-Char, B. El-Hassan, A. Mhamed
{"title":"An Enhanced Authenticated Key Agreement Protocol with a Neural Network-based Model for Joining-Phase in Mobile Environments","authors":"P. E. Abi-Char, B. El-Hassan, A. Mhamed","doi":"10.4156/IJEI.VOL2.ISSUE2.11","DOIUrl":null,"url":null,"abstract":"Providing secure communication for mobile environment is very important. In such environments, it is envisaged that users (through one of their mobile devices and via some network access technologies) should be able to seamlessly discover, select, and access a rich offering of services from a range of service providers. Password-based and ID-based authentication schemes are widely used but they still have potential threats that the passwords and verification table may be read, or altered by intruder. Moreover, the user’s privacy is not achieved especially if a principal’s privacy is to be protected. On the other side, Neural Network has been attracting more and more researchers since the past decades. The properties such as parameter sensitivity, random similarity, learning ability, etc., make it very suitable for information protection and privacy preserving. In this paper we present a Neural based secure joining phase with a biometric based Authenticated Key Agreement (NB-EC-SAKA). Our proposed protocol provides privacy, biometric-based secure mutual authentication, key establishment and key confirmation over an untrusted network. Our protocol is a based on EC-SAKA protocol [16], on Elliptic Curve Cryptography, and on EC-digital signature. The new proposal relies on [16] to achieve many of the required security and performance properties including dictionary attacks, ManIn-The middle attack, perfect forward secrecy which protects past sessions and passwords against future compromise, etc. This paper presents a review on the biometric authentication and neural networks techniques and presents a new scheme where user’s security and privacy are preserved. The purpose of our scheme is to ensure that the rendered services are accessed only by a legitimate user and not anyone else and while privacy is preserved.","PeriodicalId":223554,"journal":{"name":"International Journal of Engineering and Industries","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering and Industries","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4156/IJEI.VOL2.ISSUE2.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Providing secure communication for mobile environment is very important. In such environments, it is envisaged that users (through one of their mobile devices and via some network access technologies) should be able to seamlessly discover, select, and access a rich offering of services from a range of service providers. Password-based and ID-based authentication schemes are widely used but they still have potential threats that the passwords and verification table may be read, or altered by intruder. Moreover, the user’s privacy is not achieved especially if a principal’s privacy is to be protected. On the other side, Neural Network has been attracting more and more researchers since the past decades. The properties such as parameter sensitivity, random similarity, learning ability, etc., make it very suitable for information protection and privacy preserving. In this paper we present a Neural based secure joining phase with a biometric based Authenticated Key Agreement (NB-EC-SAKA). Our proposed protocol provides privacy, biometric-based secure mutual authentication, key establishment and key confirmation over an untrusted network. Our protocol is a based on EC-SAKA protocol [16], on Elliptic Curve Cryptography, and on EC-digital signature. The new proposal relies on [16] to achieve many of the required security and performance properties including dictionary attacks, ManIn-The middle attack, perfect forward secrecy which protects past sessions and passwords against future compromise, etc. This paper presents a review on the biometric authentication and neural networks techniques and presents a new scheme where user’s security and privacy are preserved. The purpose of our scheme is to ensure that the rendered services are accessed only by a legitimate user and not anyone else and while privacy is preserved.
一种基于神经网络模型的移动环境下连接阶段增强认证密钥协议
为移动环境提供安全的通信是非常重要的。在这样的环境中,设想用户(通过他们的移动设备之一和通过一些网络接入技术)应该能够无缝地发现、选择和访问来自一系列服务提供商的丰富的服务。基于密码和基于id的认证方案被广泛使用,但它们仍然存在密码和验证表被入侵者读取或修改的潜在威胁。此外,用户的隐私并没有实现,特别是如果要保护委托人的隐私。另一方面,近几十年来,神经网络吸引了越来越多的研究人员。它具有参数敏感性、随机相似度、学习能力等特点,非常适用于信息保护和隐私保护。在本文中,我们提出了一个基于神经网络的安全连接阶段与基于生物识别的认证密钥协议(NB-EC-SAKA)。我们提出的协议在一个不可信的网络上提供隐私、基于生物特征的安全相互认证、密钥建立和密钥确认。我们的协议是基于EC-SAKA协议[16],基于椭圆曲线密码学,基于ec -数字签名。新提案依赖于[16]来实现许多所需的安全和性能属性,包括字典攻击,中间人攻击,完美的前向保密,保护过去的会话和密码免受未来的泄露等。本文综述了生物特征认证和神经网络技术,提出了一种保护用户安全和隐私的新方案。我们方案的目的是确保呈现的服务只能由合法用户访问,而不是其他任何人,同时保护隐私。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信