The Community for Technology Leaders
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) (2014)
Oxford, United Kingdom
April 8, 2014 to April 11, 2014
ISBN: 978-1-4799-4425-5
pp: 273-276
ABSTRACT
Current mobile authentication solutions puts a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider.
INDEX TERMS
security protocol, authentication, phishing, Man-In-The-Middle attack, secure element, mobile signature
CITATION
Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier, "Mobile Authentication Secure against Man-in-the-Middle Attacks", 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), vol. 00, no. , pp. 273-276, 2014, doi:10.1109/MobileCloud.2014.43
342 ms
(Ver 3.3 (11022016))