2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) (2014)
Oxford, United Kingdom
April 8, 2014 to April 11, 2014
Current mobile authentication solutions puts a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider.
security protocol, authentication, phishing, Man-In-The-Middle attack, secure element, mobile signature
Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier, "Mobile Authentication Secure against Man-in-the-Middle Attacks", 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), vol. 00, no. , pp. 273-276, 2014, doi:10.1109/MobileCloud.2014.43