A Secure End-to-End Mobile Chat Scheme

被引:3
作者
Chen , Hsing-Chung [1 ,2 ]
Wen, Jyh-Horng [3 ]
Yang, Cheng-Ying [4 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] China Med Univ, China Med Univ Hosp, Dept Med Res, Taichung 40402, Taiwan
[3] Tunghai Univ, Dept Elect Engn, Taichung 40704, Taiwan
[4] Univ Taipei, Dept Comp Sci, Taipei 10048, Taiwan
来源
2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA) | 2014年
关键词
secure mobile chat; mobile chat; authentication and key agreement; End-to-End; mutual authentication; PROTOCOL;
D O I
10.1109/BWCCA.2014.147
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Currently, mobile communications are provided convenient methods to explore and communicate with each other people. A multitude of services have converged on the smartphone platform, and potentially the most notable is social networking. Thus, the electronic Mobile Chat (MC) plays a very important role in the social networking. With the increasingly growing reliance on Mobile Chat System (MCS) in one hand, and the growing number of vulnerabilities and attacks on the other hand, there is an increasingly demand for the security solutions. Despite of the critical role of MCS in the typical Internet mobile user's life, electronic MC services are not so secure. Therefore, the secure End-to-End Mobile Chat (SE2E-MC) scheme is proposed to be one of the suitable solutions. The basic framework for SE2E-MC scheme and its associated requirements are also designed in this paper. The proposal is implemented to provide mutual authentication and prevent the password guessing attack and the undetectable on-line password guessing attack. Finally, the scheme is a password-based authentication and key agreement (AKA) having easy remembered property.
引用
收藏
页码:472 / 477
页数:6
相关论文
共 14 条
[1]  
Akram RN, 2014, 8 WORKSH INF SEC THE, P124
[2]  
Chen H.C., 2010, NCM2010 6 INT C NETW, P665
[3]  
Chen HC, 2014, P 2014 8 INT C INN M, P258, DOI DOI 10.1109/IMIS.201432
[4]  
Chen HC, 2013, 8 INT C EMB MULT COM
[5]  
Chen HC, 2010, IET INT C FRONT COMP, P275
[6]   A Rotation Session Key-based Transposition Cryptosystem Scheme Applied to Mobile Text Chatting [J].
Chen, Hsing-Chung ;
Epa, Alpha Liezel V. .
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, :497-503
[7]   A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism [J].
Chen, Hsing-Chung ;
Yang, Cheng-Ying ;
Su, Hui-Kai ;
Wei, Ching-Chuan ;
Lee, Chao-Ching .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (03) :1091-1112
[8]   Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy [J].
Chen, Hsing-Chung .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) :100-107
[9]  
Cole E., 2005, NETWORK SECURITY BIB
[10]   MILC: A secure and privacy-preserving mobile instant locator with chatting [J].
Loukas, Athanasios ;
Damopoulos, Dimitrios ;
Menesidou, Sofia A. ;
Skarkala, Maria E. ;
Kambourakis, Georgios ;
Gritzalis, Stefanos .
INFORMATION SYSTEMS FRONTIERS, 2012, 14 (03) :481-497