M. Bilal, and S. Kang. (2017)cite arxiv:1702.04055Comment: This article is accepted for the publication in "International Journal of Communication Systems".
Abstract
Authentication is the first step toward establishing a service provider and
customer (C-P) association. In a mobile network environment, a lightweight and
secure authentication protocol is one of the most significant factors to
enhance the degree of service persistence. This work presents a secure and
lightweight keying and authentication protocol suite termed TAP (Time-Assisted
Authentication Protocol). TAP improves the security of protocols with the
assistance of time-based encryption keys and scales down the authentication
complexity by issuing a re-authentication ticket. While moving across the
network, a mobile customer node sends a re-authentication ticket to establish
new sessions with service-providing nodes. Consequently, this reduces the
communication and computational complexity of the authentication process. In
the keying protocol suite, a key distributor controls the key generation
arguments and time factors, while other participants independently generate a
keychain based on key generation arguments. We undertake a rigorous security
analysis and prove the security strength of TAP using CSP and rank function
analysis.
%0 Generic
%1 bilal2017TimeAuthentication
%A Bilal, Muhammad
%A Kang, Shin-Gak
%D 2017
%E Obaidat, Mohammad
%K myown
%T Time-Assisted Authentication Protocol
%U http://arxiv.org/abs/1702.04055
%X Authentication is the first step toward establishing a service provider and
customer (C-P) association. In a mobile network environment, a lightweight and
secure authentication protocol is one of the most significant factors to
enhance the degree of service persistence. This work presents a secure and
lightweight keying and authentication protocol suite termed TAP (Time-Assisted
Authentication Protocol). TAP improves the security of protocols with the
assistance of time-based encryption keys and scales down the authentication
complexity by issuing a re-authentication ticket. While moving across the
network, a mobile customer node sends a re-authentication ticket to establish
new sessions with service-providing nodes. Consequently, this reduces the
communication and computational complexity of the authentication process. In
the keying protocol suite, a key distributor controls the key generation
arguments and time factors, while other participants independently generate a
keychain based on key generation arguments. We undertake a rigorous security
analysis and prove the security strength of TAP using CSP and rank function
analysis.
@misc{bilal2017TimeAuthentication,
abstract = {Authentication is the first step toward establishing a service provider and
customer (C-P) association. In a mobile network environment, a lightweight and
secure authentication protocol is one of the most significant factors to
enhance the degree of service persistence. This work presents a secure and
lightweight keying and authentication protocol suite termed TAP (Time-Assisted
Authentication Protocol). TAP improves the security of protocols with the
assistance of time-based encryption keys and scales down the authentication
complexity by issuing a re-authentication ticket. While moving across the
network, a mobile customer node sends a re-authentication ticket to establish
new sessions with service-providing nodes. Consequently, this reduces the
communication and computational complexity of the authentication process. In
the keying protocol suite, a key distributor controls the key generation
arguments and time factors, while other participants independently generate a
keychain based on key generation arguments. We undertake a rigorous security
analysis and prove the security strength of TAP using CSP and rank function
analysis.},
added-at = {2017-02-15T11:37:03.000+0100},
author = {Bilal, Muhammad and Kang, Shin-Gak},
biburl = {https://www.bibsonomy.org/bibtex/2b574cad7afeaac7b5b5b9898781462c6/mbilal},
description = {Time-Assisted Authentication Protocol},
editor = {Obaidat, Mohammad},
interhash = {f458e36b3d3545407f984629bb32e20c},
intrahash = {b574cad7afeaac7b5b5b9898781462c6},
keywords = {myown},
note = {cite arxiv:1702.04055Comment: This article is accepted for the publication in "International Journal of Communication Systems"},
timestamp = {2017-02-15T11:37:03.000+0100},
title = {Time-Assisted Authentication Protocol},
url = {http://arxiv.org/abs/1702.04055},
year = 2017
}