Mobile authentication secure against man-in-the-middle attacks

Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Citations (Scopus)

Abstract

Current mobile authentication solutions puts a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider.

Original languageEnglish
Title of host publicationProceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014
PublisherIEEE Computer Society
Pages273-276
Number of pages4
ISBN (Print)9781479925049
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014 - Oxford, United Kingdom
Duration: 7 Apr 201410 Apr 2014

Publication series

NameProceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014

Conference

Conference2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014
Country/TerritoryUnited Kingdom
CityOxford
Period7/04/1410/04/14

Keywords

  • Authentication
  • Man-In-The-Middle attack
  • Mobile signature
  • Phishing
  • Secure element
  • Security protocol

Fingerprint

Dive into the research topics of 'Mobile authentication secure against man-in-the-middle attacks'. Together they form a unique fingerprint.

Cite this