What is it about?
Secure information sharing has become very popular in immigration, military applications, healthcare, education and foreign affairs for the past few years. Security and privacy cannot be easily compromised because the secure communication utilizes both wireless and wired communication media for exchanging sensitive information. To improve the security, integrity, authenticity and privacy issues while sharing of information, numerous authentication procedures or set-of-rules have been recommended by different researchers in recent times. The authentication protocols are vulnerable to prospective security flaws e.g. replay attack, masquerading, insider attack, impersonation, password guessing, server spoofing, Denning Sacco and denial-of-service (DoS). Further, these mechanisms also fail to deliver mutual authentication. Almost, no researcher claims with conviction about a foolproof secure authentication protocol. This research mainly focuses on designing a protocol that attains low computation costs, low communication complexity and low storage overhead than other existing and related protocols and shows a significant balance between performance and security. The proposed protocol also offers mutual authentication and reliable information delivery between user and server. A provable security analysis for the proposed protocol has also been established mathematically using BAN logic of authentication.
Featured Image
Photo by Priscilla Du Preez on Unsplash
Why is it important?
Application program commonly monitors task scheduling fragment of each part, authenticate the user recorded data and finally post a message to remote server platforms for communication [1]. The user interfaces part of the application programs designed for end users to understand, operate and specifically to interface with a remote server for easy communication of aforementioned activities. Afterward the server gets demands from clients, accomplishes record repossession, renews and regulates data integrity and finally posts replies to the clients. The server works like a software powerhouse that controls software, provides database facilities, controls printing devices, monitor communication line and enhance the performance of high powered processor (CPU). The key aim of the server is to complete the back-end responsibilities that are mutual to related applications and users. Network Operating System installed in the server facilitates service areas, such as direction-finding, delivery, messaging, communication supervision services, and guidelines for different tasks [2]. Subsequently, the somatic link is detected, recognized and transfer control protocol (TCP) is carefully chosen for mutual authentication between the server and the client. Therefore, a strong authentication protocol becomes mandatory for distributed computation prior the client gets benefit of the network facilities. So first it provides a straightforward application usage. Secondly, the applications are not in isolation. Third, there is not a monolithic system. Fourthly, the application programs are not complicated and finally, the supporting technology is not based on a centralized control model.
Perspectives
Read the Original
This page is a summary of: An Improved Lightweight Privacy-Preserving Authentication Scheme for SIP-Based-VoIP Using Smart Card, SSRN Electronic Journal, January 2017, Elsevier,
DOI: 10.2139/ssrn.3345110.
You can read the full text:
Resources
Contributors
The following have contributed to this page