Show simple item record

dc.contributor.authorAhmed, Abdulghani Ali
dc.contributor.authorWendy, Kwan
dc.contributor.authorKabir, Mohammed Noman
dc.contributor.authorSadiq, Ali Safaa
dc.date.accessioned2020-08-03T09:31:17Z
dc.date.available2020-08-03T09:31:17Z
dc.date.issued2020-08-31
dc.identifier.citationAhmed, A. A., Wendy, K., Kabir, M. N. and Al-Shakarchi, A. S. (2021) Dynamic reciprocal authentication protocol for mobile cloud computing, IEEE Systems Journal, 15(1), pp. 727-737. 10.1109/JSYST.2020.3012986en
dc.identifier.issn1932-8184en
dc.identifier.doi10.1109/JSYST.2020.3012986
dc.identifier.urihttp://hdl.handle.net/2436/623412
dc.descriptionThis is an accepted manuscript of an article published by IEEE in IEEE Systems Journal on 31/08/2020, available online: https://doi-org.ezproxy.wlv.ac.uk/10.1109/JSYST.2020.3012986 The accepted version of the publication may differ from the final published version.en
dc.description.abstractA combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playback, impersonation, and asynchronization attacks. To address these threats, we define an explicit security model that can precisely measure the practical capabilities of an adversary. A systematic methodology consisting of 16 evaluation criteria is used for comparative evaluation, thereby leading other approaches to be evaluated through a common scale. Finally, we propose a dynamic reciprocal authentication protocol to secure data transmission in mobile cloud computing. In particular, our proposed protocol develops a secure reciprocal authentication method, which is free of Diffie–Hellman limitations, and has immunity against basic or sophisticated known attacks. The protocol utilizes multi-factor authentication of usernames, passwords, and a one-time password. The password is automatically generated and regularly updated for every connection. The proposed protocol is implemented and tested using Java to demonstrate its efficiency in authenticating communications and securing data transmitted in the mobile cloud computing environment. Results of the evaluation process indicate that compared with the existing works, the proposed protocol possesses obvious capabilities in security and in communication and computation costs.en
dc.description.sponsorshipFunding support was provided by the fund of COMSTECH-TWAS, joint research grant program for young scientists in OIC countries (No. 14-340 RG/ITC/AS_C).en
dc.formatapplication/pdfen
dc.language.isoenen
dc.publisherIEEEen
dc.subjectmobile cloud computingen
dc.subjectauthenticationen
dc.subjectDiffie–Hellmanen
dc.subjectone-time passworden
dc.titleDynamic reciprocal authentication protocol for mobile cloud computingen
dc.typeJournal articleen
dc.identifier.journalIEEE Systems Journalen
dc.date.updated2020-07-14T13:32:30Z
dc.date.accepted2020-07-13
rioxxterms.funderUniversity of Wolverhamptonen
rioxxterms.identifier.project14-340 RG/ITC/AS_Cen
rioxxterms.versionAMen
rioxxterms.licenseref.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/en
rioxxterms.licenseref.startdate2020-08-03en
dc.source.volume15
dc.source.issue1
dc.source.beginpage727
dc.source.endpage737
refterms.dateFCD2020-08-03T09:30:28Z
refterms.versionFCDAM
refterms.dateFOA2020-08-03T00:00:00Z


Files in this item

Thumbnail
Name:
AlShakarchi_Dynamic_Reciprocal ...
Size:
832.0Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by-nc-nd/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-nd/4.0/