http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
( Azeem Irshad ),( Muhammad Sher ),( Bander A. Alzahrani ),( Aiiad Albeshri ),( Shehzad Ashraf Chaudhry ),( Saru Kumari ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.1
The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.’s scheme demonstrated that Mishra et al.’s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.’s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.’s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services
Irshad, Azeem,Sher, Muhammad,Ahmad, Hafiz Farooq,Alzahrani, Bander A.,Chaudhry, Shehzad Ashraf,Kumar, Rahul Korean Society for Internet Information 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12
Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.
( Azeem Irshad ),( Hafiz Farooq Ahmad ),( Bander A. Alzahrani ),( Muhammad Sher ),( Shehzad Ashraf Chaudhry ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12
Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu`s protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.
Irshad, Azeem,Ahmad, Hafiz Farooq,Alzahrani, Bander A.,Sher, Muhammad,Chaudhry, Shehzad Ashraf Korean Society for Internet Information 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12
Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.
An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services
( Azeem Irshad ),( Muhammad Sher ),( Hafiz Farooq Ahmad ),( Bander A. Alzahrani ),( Shehzad Ashraf Chaudhry ),( Rahul Kumar ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.12
Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.
Development of a 3D Color Diagram for Improved Visual Grading System of Cotton
Nayab Khan,Michael Vik,Farida Irshad,Bekir Yildirim,Assad Farooq,Muhammad Azeem Ashraf 한국섬유공학회 2023 Fibers and polymers Vol.24 No.1
The international trade of cotton is based on color and trash, which can be assessed by different methods. Although thereare so many instruments in the market to measure the color of cotton, but still now, the visual grading of cotton color is considered to be the most impressive method. Cotton-growing countries have professionally trained persons to grade the colorof cotton according to international standards. The disagreement between visual and instrumental grading is a big problemin the industry. In this research work, an improved method of visual grading system was developed, and the color diagramis represented in different color spaces.