4.18.24 Movement Legacies, Reflection, and Review.pptx
Provably Secure Nested OTPs for Fast Mobile Authentication
1. PROVABLY SECURE NESTED ONE-TIME SECRET
MECHANISMS FOR FAST MUTUAL AUTHENTICATION AND
KEY EXCHANGE IN MOBILE COMMUNICATIONS
BATCH MEMBERS
D.NEHRU -40907104049
R.PRABU -40907104055
A.SALAI MAMANI SEKARAN -40907104065
GUIDED BY:
Mrs.N. Ramya B.E.,(M.E.)
Lect. Of Computer Science
2. ABSTRACT
Authentication mechanisms for mobile communiocations plays an
important role in the entire mobile network system and acts as the first
defense against attackers.
It ensures the correctness of the identities of distributed communication
entities before they engage in any other communication activity.
This is based on novel authentication mechanism, called the nested one-
time secret mechanism,
Through maintaining inner and outer synchronously changeable common
secrets, respectively, every mobile user can be rapidly authenticated by
visited location register (VLR) and home location register (HLR).
3. EXISTING MODEL
The messages transmitted in wireless communication networks are
exposed in the air, so malicious parties in wireless environments have
more opportunities to intercept these transmitted messages.
Some security aspects of current mobile communication systems have
been concerned, there still exist security problems in some GSM-based
system.
For example the impersonating attack and replay attack works because
of the lack of mutual authentication in the GSM system.
4. PROPOSED MODEL
The proposed system maintaining inner and outer synchronously
changeable common secrets.
Every mobile user can be rapidly authenticated by visited location
register (VLR) and home location register (HLR), respectively, in the
proposed scheme.
Mutual authentication and other related security issues have been
considered in the GSM-based authentication protocols to guarantee the
quality of the communication services.
The proposed scheme can also withstand the replay attack and the
impersonating attacks on mobile communications and speed up
authentication.
6. Networking Module:
Client-server computing or networking is a distributed application
architecture that partitions tasks or workloads between service
providers (servers) and service requesters, called clients.
Clients and servers operate over a computer network on separate
hardware.
A server machine is a high-performance host that is running one or
more server programs which share its resources with clients.
A client also shares any of its resources; Clients therefore initiate
communication sessions with servers which await (listen to)
incoming requests.
7. SECURE MOBILE COMMUNICATION
We come up with a novel authentication mechanism, called the nested
one-time secret mechanism, For mobile communication environments.
We present an efficient mutual authentication scheme for mobile
communications.
We have proposed a secure mutual authentication and key exchange
scheme for mobile communications based on a nested one-time secrets.
The proposed scheme can withstand the replay attack and the
impersonating attack on mobile communications and speed up
authentication.
8. Security Module:
The security of wireless communication systems if no protection
mechanism is considered.
Some security aspects of current mobile communication systems
have been concerned, there still exist security problems in some
GSM-based systems.
We prove that the proposed protocols are secure mutual
authentication and key exchange protocols under the assumption
that the adopted underlying symmetric cryptosystem is with the
IND-CCA security and the adopted pseudorandom permutation and
the pseudorandom function are secure.
9. Authentication protocol:
The impersonating attack works because of the lack of mutual authentication in the GSM
system.
Mutual authentication and other related security issues have been considered in the
GSM-based authentication protocols proposed in the literature but their performance
should be improved to guarantee the quality of the communication services.
The vectors will be discarded whenever the corresponding mobile user visits a new
VLR, which will waste the resources and increase the computation and communication
cost for the system.
Accordingly, among these proposed authentication protocols the scheme of is the most
efficient and practical one for GSM-based systems.
We can make use of the timestamp-based solution to build up the mutual authentication
protocol between each VLR and the HLR.
20. The proposed scheme consists of mutual
authentication and key exchange for mobile
communication based on one time secret
mechanism
Our experimental results shows that the proposed
scheme greatly reduces the computation cost
required for each mobile user by nearly 33% when
compared to the existing scheme
It greatly increases the performance and
guarantees the quality of the communication
services.
CONCLUSION