The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1109/jsyst.2020.3012986
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing

Abstract: A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-themiddle, playback, impersonation, and asynchronization attacks. To address these threats, we define an explicit security model that can precisely measure the practical capabilities of an adversary. A systematic methodology consist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…In 2021, ref. [ 36 ] presented an efficient dynamic reciprocal authentication scheme using a one-time password to achieve multi-factor authentication, which is good at preventing the social engineering attack and replay attack. Ref.…”
Section: Related Workmentioning
confidence: 99%
“…In 2021, ref. [ 36 ] presented an efficient dynamic reciprocal authentication scheme using a one-time password to achieve multi-factor authentication, which is good at preventing the social engineering attack and replay attack. Ref.…”
Section: Related Workmentioning
confidence: 99%
“…In 2020, Ahmed A. A, et al [19] proposed the DRmcc protocol. Multifactor authentication, Diffie-Hellman key exchange, and One-Time Password (OTP) are used in the protocol to achieve mutual validation and authentication.…”
Section: Literature Surveymentioning
confidence: 99%
“…To address the threats to cloud computing, a security model that accurately calculates the empirical capacity of a contender authentication framework for securing the transmission of data in cloud computing architecture was proposed in [14]. The results from the experiment carried out show that the suggested framework was more efficient than the existing ones.…”
Section: Literature Reviewmentioning
confidence: 99%