User Authentication Protocol Based on the Location Factor for a Mobile Environment

被引:7
作者
Bartlomiejczyk, Maciej [1 ]
El Fray, Imed [1 ]
Kurkowski, Miroslaw [2 ]
Szymoniak, Sabina [3 ]
Siedlecka-Lamch, Olga [3 ]
机构
[1] West Pomeranian Univ Technol, PL-70310 Szczecin, Poland
[2] Cardinal Stefan Wyszynski Univ Warsaw, Inst Comp Sci, PL-01815 Warsaw, Poland
[3] Czestochowa Tech Univ, Dept Comp Sci, PL-42201 Czestochowa, Poland
关键词
Authentication; Protocols; Smart phones; Servers; Authorization; Wireless fidelity; Performance evaluation; Authentication protocols; electronic identification; mobile environment; multifactor authentication; location-based authentication; SECURITY PROTOCOLS; MODEL CHECKER; DEVICES; LOGIC;
D O I
10.1109/ACCESS.2022.3148537
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The way the internet is used by billions of users around the world has been revolutionized by mobile devices. The capabilities of smartphones are constantly growing, and the number of services available for mobile devices is also increasing. This undeniable trend makes smartphones terminals for accessing services that process confidential data, which make smartphones priceless targets of cyberattacks. Along with an increasing number of mobile services, the methods of securing the confidentiality, integrity and availability of systems used have also evolved and adapted to the capabilities of a mobile environment. One of the important security services is the user authentication process. This process often implements the postulates of strong authentication, multistage authentication based on factors from the knowledge, position and inherence categories. Unfortunately, the implementation of the factors belonging to these categories is not always possible due to the limitations of smartphones, such as the lack of interfaces for the implementation of biometrics or environmental factors - problems with network or internet access in various countries and regions. Therefore, there is a need to analyse the possibility of implementing a strong authentication process based on additional information about users, e.g., based on location data. The article analyses the requirements for the authentication process and authentication factors. Based on the performed analysis, the criteria that each authentication factor must meet were defined. This article presents a proposal for a user authentication protocol based on the location factor for a mobile environment. The method can be used in the case of problems with the implementation of strong authentication or as an additional authentication factor that increases the security of the user identity confirmation process. The presented protocol has been analysed in terms of performance, security and compliance with the requirements related to the authentication factors.
引用
收藏
页码:16439 / 16455
页数:17
相关论文
共 45 条
  • [1] Adukkathayar A, 2015, INT CONF COMP SCI ED, P349, DOI 10.1109/ICCSE.2015.7250269
  • [2] Ahmadi M, 2016, 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), P60, DOI 10.1109/ISCISC.2016.7736452
  • [3] Negative impact of long-term exposure of salinity and drought stress on native Tetraena mandavillei L.
    Alam, Hasnain
    Khattak, Jabar Z. K.
    Ksiksi, Taoufik S.
    Saleem, Muhammad H.
    Fahad, Shah
    Sohail, Hamza
    Ali, Qasim
    Zamin, Muhammad
    El-Esawi, Mohamed A.
    Saud, Shah
    Jiang, Xue
    Alwahibi, Mona S.
    Alkahtani, Jawaher
    [J]. PHYSIOLOGIA PLANTARUM, 2021, 172 (02) : 1336 - 1351
  • [4] 5G mmWave Indoor Location Identification Using Beamforming and RSSI
    AlHory, Omar
    Shoushara, Omran
    AlSuri, Husam
    ALShunnaq, Moath
    Awad, Fahed
    [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 091 - 095
  • [5] [Anonymous], 2006, MIN SEC REQ FED INF, DOI [10.6028/NIST.FIPS.200, DOI 10.6028/NIST.FIPS.200]
  • [6] [Anonymous], Host-Based card Emulation. developer_android
  • [7] [Anonymous], 2015, COMMISSION IMPLEMENT, P14
  • [8] [Anonymous], 2019, REGULATORY TECHNICAL
  • [9] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [10] SATMC: A SAT-based model checker for security protocols
    Armando, A
    Compagna, L
    [J]. LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 : 730 - 733