Compare Authentication Algorithms for Mobile Systems in Order to Introduce the Successful Characteristics of these Algorithms against Attacks

Hits: 2989
Research areas:
Year:
2014
Type of Publication:
Article
Keywords:
e-Commerce, Mobile Devices, Mutual Authentication, Security, Session Key Agreement
Authors:
Shahriar Mohammadi; Hakimeh Ameri
Journal:
IJAIM
Volume:
2
Number:
4
Pages:
131-140
Month:
January
Abstract:
Nowadays use of Ecommerce with mobile devices through the special capabilities, such as mobility and widely used become more popular. The security of transactions in these devices is a great challenge due to limited computing power and relatively weak processors. Mutual authentication and session key agreement can be very influential in term of security. Algorithms introduced in the 1990s had major drawbacks. In the 2000s, a new algorithm based on hash functions were introduced, which had a small computational load, but not a high security and mutual authentication cannot fully support. Algorithms introduced from 2010 onwards due to a combination of hash functions Salt and Nonce are safer. This paper examines the success of the algorithms introduced in this field since 2004 deals.
Full text: IJAIM_220_Final.pdf

Indexed By