Home > Research > Publications & Outputs > Time-assisted authentication protocol

Text available via DOI:

View graph of relations

Time-assisted authentication protocol

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Time-assisted authentication protocol. / Bilal, Muhammad; Kang, Shin Gak.
In: International Journal of Communication Systems, Vol. 30, No. 15, e3309, 10.2017.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Bilal, M & Kang, SG 2017, 'Time-assisted authentication protocol', International Journal of Communication Systems, vol. 30, no. 15, e3309. https://doi.org/10.1002/dac.3309

APA

Bilal, M., & Kang, S. G. (2017). Time-assisted authentication protocol. International Journal of Communication Systems, 30(15), Article e3309. https://doi.org/10.1002/dac.3309

Vancouver

Bilal M, Kang SG. Time-assisted authentication protocol. International Journal of Communication Systems. 2017 Oct;30(15):e3309. doi: 10.1002/dac.3309

Author

Bilal, Muhammad ; Kang, Shin Gak. / Time-assisted authentication protocol. In: International Journal of Communication Systems. 2017 ; Vol. 30, No. 15.

Bibtex

@article{3ad22ce6aa434204a577cb80e210f093,
title = "Time-assisted authentication protocol",
abstract = "Authentication is the first step toward establishing a service provider and customer association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence. This work presents a secure and lightweight keying and authentication protocol suite termed time-assisted authentication protocol (TAP). The TAP improves the security of protocols with the assistance of time-based encryption keys and scales down the authentication complexity by issuing a reauthentication ticket. While moving across the network, a mobile customer node sends a reauthentication ticket to establish new sessions with service-providing nodes. Consequently, this reduces the communication and computational complexity of the authentication process. In the keying protocol suite, a key distributor controls the key generation arguments and time factors, while other participants independently generate a keychain based on key generation arguments. We undertake a rigorous security analysis and prove the security strength of TAP using communicating sequential processes and rank function analysis.",
keywords = "authentication, CSP, key distribution, network security, rank functions",
author = "Muhammad Bilal and Kang, {Shin Gak}",
year = "2017",
month = oct,
doi = "10.1002/dac.3309",
language = "English",
volume = "30",
journal = "International Journal of Communication Systems",
issn = "1074-5351",
publisher = "John Wiley and Sons Ltd",
number = "15",

}

RIS

TY - JOUR

T1 - Time-assisted authentication protocol

AU - Bilal, Muhammad

AU - Kang, Shin Gak

PY - 2017/10

Y1 - 2017/10

N2 - Authentication is the first step toward establishing a service provider and customer association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence. This work presents a secure and lightweight keying and authentication protocol suite termed time-assisted authentication protocol (TAP). The TAP improves the security of protocols with the assistance of time-based encryption keys and scales down the authentication complexity by issuing a reauthentication ticket. While moving across the network, a mobile customer node sends a reauthentication ticket to establish new sessions with service-providing nodes. Consequently, this reduces the communication and computational complexity of the authentication process. In the keying protocol suite, a key distributor controls the key generation arguments and time factors, while other participants independently generate a keychain based on key generation arguments. We undertake a rigorous security analysis and prove the security strength of TAP using communicating sequential processes and rank function analysis.

AB - Authentication is the first step toward establishing a service provider and customer association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence. This work presents a secure and lightweight keying and authentication protocol suite termed time-assisted authentication protocol (TAP). The TAP improves the security of protocols with the assistance of time-based encryption keys and scales down the authentication complexity by issuing a reauthentication ticket. While moving across the network, a mobile customer node sends a reauthentication ticket to establish new sessions with service-providing nodes. Consequently, this reduces the communication and computational complexity of the authentication process. In the keying protocol suite, a key distributor controls the key generation arguments and time factors, while other participants independently generate a keychain based on key generation arguments. We undertake a rigorous security analysis and prove the security strength of TAP using communicating sequential processes and rank function analysis.

KW - authentication

KW - CSP

KW - key distribution

KW - network security

KW - rank functions

UR - http://www.scopus.com/inward/record.url?scp=85017338577&partnerID=8YFLogxK

U2 - 10.1002/dac.3309

DO - 10.1002/dac.3309

M3 - Journal article

AN - SCOPUS:85017338577

VL - 30

JO - International Journal of Communication Systems

JF - International Journal of Communication Systems

SN - 1074-5351

IS - 15

M1 - e3309

ER -