Mobile Authentication Secure Against Man-In-The-Middle Attacks
Author(s) -
Kemal Biçakcı,
Devrim Ünal,
Nadir Ascioglu,
Oktay Adalier
Publication year - 2014
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2014.07.031
Subject(s) - computer science , man in the middle attack , computer security , authentication (law) , mobile device , computer network , context (archaeology) , service provider , authentication protocol , challenge handshake authentication protocol , mobile computing , protocol (science) , service (business) , world wide web , medicine , paleontology , economy , alternative medicine , pathology , biology , economics
Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom