Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure

Krishna Prakasha, Balachandra Muniyal, Vasundhara Acharya

Research output: Contribution to journalArticle

Abstract

Purpose: The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach: One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings: The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value: The proposed research work is an efficient and enhanced user authentication mechanism.

Original languageEnglish
JournalInformation Discovery and Delivery
DOIs
Publication statusAccepted/In press - 01-01-2019

Fingerprint

Mobile commerce
commerce
Authentication
infrastructure
transaction
Network protocols
Internet
communication
methodology
Cryptography
management
resources
Values
Communication

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Library and Information Sciences

Cite this

@article{27e29349b2904d35840fda37155a6a3e,
title = "Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure",
abstract = "Purpose: The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach: One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings: The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value: The proposed research work is an efficient and enhanced user authentication mechanism.",
author = "Krishna Prakasha and Balachandra Muniyal and Vasundhara Acharya",
year = "2019",
month = "1",
day = "1",
doi = "10.1108/IDD-02-2019-0012",
language = "English",
journal = "Information Discovery and Delivery",
issn = "2398-6247",
publisher = "Emerald Group Publishing Ltd.",

}

TY - JOUR

T1 - Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure

AU - Prakasha, Krishna

AU - Muniyal, Balachandra

AU - Acharya, Vasundhara

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Purpose: The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach: One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings: The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value: The proposed research work is an efficient and enhanced user authentication mechanism.

AB - Purpose: The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach: One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings: The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value: The proposed research work is an efficient and enhanced user authentication mechanism.

UR - http://www.scopus.com/inward/record.url?scp=85074052598&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85074052598&partnerID=8YFLogxK

U2 - 10.1108/IDD-02-2019-0012

DO - 10.1108/IDD-02-2019-0012

M3 - Article

AN - SCOPUS:85074052598

JO - Information Discovery and Delivery

JF - Information Discovery and Delivery

SN - 2398-6247

ER -