Implementation of System Environment for Smart Authentication Service

  • Authors

    • Young-Gee Min
    • Bong-Hyun Kim
    • Eon-Gon Kim
    https://doi.org/10.14419/ijet.v7i3.24.22833
  • Smart Authentication, Authentication Management Server, Push Server, Web Access Notification, PC Client.
  • Background/Objectives: As the various security threats increase, security accidents are frequent due to leakage of ID and password and illegal stealing. As a result, various cyber crimes and property damages are occurring due to the leakage of personal information online.

    Methods/Statistical analysis: Security technologies are continuously being developed to protect information by blocking illegal activities such as accessing, browsing, copying, stealing or destruction of certain information by unauthorized persons. The use of existing web services is usually a method of using the ID / password method or the mobile phone authentication number by using a mobile phone or the like. These existing methods are limited in terms of operation, time, inconvenience in use, and functional limitations.

    Findings: Therefore, in this paper, we set the access control time and restrict the re-login of the web server with the same ID and password for the access control time, so that after a third party who illegally logs in to the web server is forcibly logged out from the web server, Prevents re-login with username and password, re-login to the web server, arbitrarily changing the user ID and password to prevent the user from legitimately logging in to the web server. Also, through the setting control time, the user can re-issue the password to the web server operator by requesting the web server to secure time for logging in to the web server.

    Improvements/Applications: In this paper, we have implemented a system environment to provide smart authentication service. Through this, we developed an Android-based smartphone app client that can be installed on the smartphone and perform subscription, configuration, and various functions, and implemented a smart certification service environment that performs various information and statistics management.

     

  • References

    1. [1] Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil Pairing. Asiacrypt 2001. LNCS, 2248, 514–532.

      [2] Fujioka, A., Saito, T., & Xagawa, K. (2012). Applicability of OR-proof techniques to hierarchical identity-based identification. CANS 2012, LNCS, 7712, 169–184.

      [3] Wen-Bin Hsieh, Jenq-Shiou Leu. (2017). An Improved Mutual Authentication Mechanism for Securing Smart Phones. https://link.springer.com/journal/11277">Wireless Personal Communications, 97(2), 2911–2924.

      [4] Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.

      [5] Anderson, K., Jimmy, D., Narayan, A., &El Gamal, A. (2014). Grid-spice: a distributed simulation platform for the smart grid. IEEE transfer Industrial Informatics, 10(4), 2354–2363.

      [6] Fan Wu, Lili Xu,Saru Kumari & Xiong Li (2018). An improved and provably secure three-factor user authentication scheme for wireless sensor networks. https://link.springer.com/journal/12083">Peer-to-Peer Networking and Applications, 11(1), 1–20.

      [7] Burnett, A., Byrne, F., Dowling, T., &Duffy, A. (2007). A Biometric Identity Based Signature Scheme. International Journal Information Security, 5(3), 317–326.

      [8] Mets, K., Ojea, JA. & Develder, C. (2014). Combining power and communication network simulation for cost effective smart grid analysis. IEEE Communication Survey Tutorials, 16(3), 1771–1796.

      [9] Jiang, Y., Lin, C., Shen, X., & Shi, M. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 5(9), 2569–2577.

      [10] Bresson, E., Chevassut, O., & Pointcheval, D. (2003). Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on computer and communications security, 241–250.

      [11] Chen TH, & Shih WK (2010). A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 32(5), 704–712.

      [12] Anderson, D., Zhao, C., Hauser, C., Venkatasubramanian, V., Bakken, D., &Bose, A. (2012). A virtual smart grid—real-time simulation for smart grid control and communications design. IEEE Power &Energy Magazine, 10(1), 49–57.

      [13] Fazeli, M., Asher, G., Klumpner, C., Yao, L., & Bazargan, M. (2012). Novel in-tegration of wind generator-energy storage systems within microgrids. IEEE Trans Smart Grid, 3(2), 728–737.

      [14] Sung, A., Zu, J., Chavez, P., & Mukkamala, S. (2004). Static Analyzer for Vicious Executavles (SAVE). In: 20th Annual Computer Security Applications Conference, 326–334.

      [15] Das, AK., Chatterjee, S., &Sing, JK. (2014). Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks. International Journal of Trust Management in Computing and Communications, 2(1), 78–102.

  • Downloads

  • How to Cite

    Min, Y.-G., Kim, B.-H., & Kim, E.-G. (2018). Implementation of System Environment for Smart Authentication Service. International Journal of Engineering & Technology, 7(3.24), 646-650. https://doi.org/10.14419/ijet.v7i3.24.22833