Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC

被引:18
作者
Rajamanickam, Siranjeevi [1 ]
Vollala, Satyanarayana [2 ]
Amin, Ruhul [2 ]
Ramasubramanian, N. [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli 493661, India
[2] IIIT Naya Raipur, Dept Comp Sci & Engn, Naya Raipur 493661, India
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 02期
关键词
Password; Protocols; Cryptography; Entropy; Organizations; Authentication; Elliptic curve cryptography (ECC); insider attacks; password-management server (PMS); security; SECURITY; THREATS; NETWORK; MODEL;
D O I
10.1109/JSYST.2019.2933464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The radical advancement in web services has drawn more attention toward intensifying the security of numerous applications that interact and serve the Internet users. In order to access the different applications on the web, users need to disclose their personal credentials such as username and password to the servers to get authenticated. This private information should be prevented from being exploited due to different security attacks that will result in illegal activities. Securing the systems from several attacks is vital. In comparison to all the security attacks, insider attacks are devastating due to the privilege the insiders of an organization possess to breach the information, which results in irrecoverable damage to both user and the organization. Numerous protocols were proposed to secure the system from insider attacks but proved to be inefficient. This article puts forward a novel authentication protocol for insider attacks based on a robust cryptographic algorithm, ECC. The informal security analysis of the protocol reveals that the proposed protocol is not only immune to insider attacks but also prevents several attacks. It shows that the protocol is relatively better than other existing protocols in terms of computational cost and communication overhead with high level of security.
引用
收藏
页码:1972 / 1983
页数:12
相关论文
共 49 条
  • [1] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [2] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh
    Litrico, Xavier
    Sastry, Shankar
    Bayen, Alexandre M.
    [J]. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) : 1963 - 1970
  • [3] [Anonymous], J MED SYST
  • [4] [Anonymous], 2013, J. Med. Syst.
  • [5] Anton S., 2015, P INT SCI C STRAT 21, P382
  • [6] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Nikooghadam, Morteza
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
  • [7] Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud
    Babu, B. Mahesh
    Bhanu, Mary Saira
    [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 157 - 166
  • [8] CERT Insider Threat Team, 2014, CMUSEI2014TN007
  • [9] Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Shon, Taeshik
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
  • [10] Costa D. L., 2016, Tech. Rep. CMU/SEI-2016-TR-007