NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // ICWMC 2011, The Seventh International Conference on Wireless and Mobile Communications // View article icwmc_2011_14_10_20055


Challenge Token-based Authentication – CTA

Authors:
Ghassan Kbar

Keywords: wireless; authentication; security

Abstract:
A new technique for highly securing the wired and wireless local area network using a Challenge Token-based Authentication as a second authentication factor is presented. This technique is based on two authentication factors, which is in addition to the first factor "user name and password", it also uses the client soft token that will be stored in a mobile phone or USB. The soft token will be obtained during registration and will never be transmitted during the authentication process. This token will be used by a mobile Client Program to generate a secure Authentication Server (AS) public key in order to respond to the AS's challenge. This new authentication mechanism addresses the vulnerabilities existed in the existing weak authentication method that is based only on first authentication factor. It would also solve the Denial of Service attack existed in the second authentication factor techniques because a secure server public key is used instead of well known server public key such as the one used in Extensible Authentication Protocol, and Wireless Application Protocol. In addition it reduces the complexity and associated cost existed in the mobile phone authentication technique since there is no need to send sms messages to authenticate the clients. In addition, the session key will be exchanged using the derived secure AS public key that is correlated to the soft token. This makes the security parameters known only to authentication server, and valid supplicants. Attackers would be unlikely able to know the token and other security keys since the token is only exchanged during registration through a trusted party. Moreover, the use of 2 authentication factors would make the security system stronger and more relevant to sensitive applications particularly for banks.

Pages: 294 to 300

Copyright: Copyright (c) IARIA, 2011

Publication date: June 19, 2011

Published in: conference

ISSN: 2308-4219

ISBN: 978-1-61208-140-3

Location: Luxembourg City, Luxembourg

Dates: from June 19, 2011 to June 24, 2011

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.