2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) (2014)
Oxford, United Kingdom
April 8, 2014 to April 11, 2014
Current mobile authentication solutions puts a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider.
security protocol, authentication, phishing, Man-In-The-Middle attack, secure element, mobile signature
K. Bicakci, D. Unal, N. Ascioglu and O. Adalier, "Mobile Authentication Secure against Man-in-the-Middle Attacks," 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)(MOBILECLOUD), Oxford, United Kingdom, 2014, pp. 273-276.