This paper is published in Volume-5, Issue-3, 2019
Area
Computer Science and Engineering
Author
S. Kanimozhi
Co-authors
S. Jayanthi
Org/Univ
Anna University BIT-Campus, Tiruchirappalli, Tamil Nadu, India
Pub. Date
11 May, 2019
Paper ID
V5I3-1321
Publisher
Keywords
Multi-factor authentication, AKE (Authenticated Key Exchange) Protocol, Key stroke authentication, Session key generation, ECC Encryption

Citationsacebook

IEEE
S. Kanimozhi, S. Jayanthi. Multi factor AKE protocol and key stroke authentication for secured communication, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
S. Kanimozhi, S. Jayanthi (2019). Multi factor AKE protocol and key stroke authentication for secured communication. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.

MLA
S. Kanimozhi, S. Jayanthi. "Multi factor AKE protocol and key stroke authentication for secured communication." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.

Abstract

Authenticated Key Exchange (AKE) protocol permits a user and a server to authenticate each other for the first time. It generates a session key for the successive communications without any authentication. Many AKE protocols had been proposed to obtain person privateness and authentication for the duration of conversation. Other than secured consultation key established order, these AKE protocols offer a few other useful capability like two-thing user authentication and mutual authentication. But they have got few weaknesses along with vulnerability in opposition to loss of smart card, offline dictionary assault, de-synchronization attack, person anonymity or untraceability. Also, AKE scheme the usage of public key conversation doesn’t suite nicely for lightweight computational gadgets. In this work, a novel Multi-Factor AKE protocol is proposed to overcome all the above-mentioned weaknesses. This protocol supports revoked smart card transactions. The password that is available on the USB device will be overwritten once the user used it. Passwords can be updated without centralized storage. The average time to enter a password will be defined. The user has to type the password within the allocated time, failing which he/she has to enter it again. This security model of AKE supports user anonymity and resist a lost card attack. Elliptical Curve Cryptography algorithm is used for encryption and decryption of the session key. The computational cost and the bandwidth cost for this proposed model are low, which makes it useful in pervasive computing applications and mobile communications. The proposed AKE model is much secured when compared to the existing protocols.
Paper PDF