Abstract

The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The perception of single sign-on allows a legitimate user to access a different service provider on a DCN using a single session key. Recently, several user identification techniques being proposed for DCN. Unfortunately, the existing proposals cannot maintain user anonymity when the majority of probable attacks. In addition, the further time synchronization mechanism they use can result in widespread overhead costs. To overcome these shortcomings, we propose a novel authentication mechanism to prevent unauthorized service access for a mobile device in distributed networks. The mechanism implements methods to generate securely encrypted keys using RSA algorithm to validate the authentication of user login id and password. Later, it implements a secure session key generation using DH algorithm which allows accessing the different services without repeating the authentication mechanism. An experimental evaluation was performed to measure execution time overhead for the registration process, an authentication process, session key generation process and Service Request Performance. The comparison results with existing authentication mechanism show an improvisation in all the measures.

Highlights

  • In a real-world application, mobile users can use mobile devices such as mobile phones with a single session key to access a number of services such as music downloads, e-mail reception or reply, product orders, or online payments. etc., from the different service provider in a distributed computer network (DCN)

  • A new authentication mechanism based on the "RSA" and "Diffie-Hellman algorithms" for ensuring mobile user identification and efficient access to services is proposed in understanding the limitations and disadvantages of the authentication and privacy preservation schemes present in existing literature

  • The first module ensures the user registration and authentication mechanism, the second module discuss the mechanism of service session key generation (DSKey), and the third module presents the mechanism of exchanging of DH Session Key (DSKey) for restricting the unauthorized Service Access

Read more

Summary

Introduction

In a real-world application, mobile users can use mobile devices such as mobile phones with a single session key to access a number of services such as music downloads, e-mail reception or reply, product orders, or online payments. etc., from the different service provider in a distributed computer network (DCN). We propose a novel authentication mechanism to prevent unauthorized service access for a mobile device in distributed networks through a secure SSO login and dynamic service session key generation. The mechanism implements the methods to generate securely encrypted keys using RSA algorithm [9] to validate the authentication of user login id and password Later, it implements a secure session key generation using the DH algorithm[17] which allows accessing the different services without repeating the authentication mechanism. In order to gain access, multiple applications must be logged in repeatedly to obtain authentication This results in lost battery and increased computation and communication overhead for mobile devices. Section-2 discuss the background study, Section-3 presents the proposed novel authentication mechanism methodology, Section-4 provide the experiment and results in evaluation and section-5 present the conclusion of the proposal work

Background
Proposed Authentication Mechanism
User Registration and Authentication Mechanism
Exchanging and validation of DSKey for Unauthorized Service Access
Experiment Evaluation
Result Analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.