Paper
28 October 2021 DoS-resisting two-factor remote authentication and key exchange scheme with user anonymity for mobile communication
Rengang Li, Yaqian Zhao, Xuelei Li, Ruyang Li, Chuang Zhang, Yunfeng Yin
Author Affiliations +
Proceedings Volume 11884, International Symposium on Artificial Intelligence and Robotics 2021; 118840O (2021) https://doi.org/10.1117/12.2603828
Event: International Symposium on Artificial Intelligence and Robotics 2021, 2021, Fukuoka, Japan
Abstract
Wireless communication and cloud are extremely popular because of its convenience, portability and immediacy. As the first line of defense for mobile communication with intelligent devices, identity authentication plays a more and more important role for system security and communication privacy. In order to enhance the security and privacy of wireless communication, this paper investigates an anonymous password-based remote user authentication and key exchange scheme for intelligent devices. Firstly, the scheme achieves secure mutual authentication while preserving user privacy. Secondly, client puzzle is employed to resist denial of service attacks and establish session keys with forward secrecy. Finally, the analysis demonstrate that our scheme works effectively and resists common known attacks, while maintaining the efficient performance for mobile users.
© (2021) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rengang Li, Yaqian Zhao, Xuelei Li, Ruyang Li, Chuang Zhang, and Yunfeng Yin "DoS-resisting two-factor remote authentication and key exchange scheme with user anonymity for mobile communication", Proc. SPIE 11884, International Symposium on Artificial Intelligence and Robotics 2021, 118840O (28 October 2021); https://doi.org/10.1117/12.2603828
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Mobile devices

Network security

Artificial intelligence

Information security

Mobile communications

Wireless communications

Back to Top