Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices

Authors

  • Kirti Kamthe  KJEI's Trinity Academy of Engineering, Pune, Maharashtra, India
  • Prtithviraj Chavan  KJEI's Trinity Academy of Engineering, Pune, Maharashtra, India
  • Monika Jadhav  KJEI's Trinity Academy of Engineering, Pune, Maharashtra, India
  • Kavita Phadatare  KJEI's Trinity Academy of Engineering, Pune, Maharashtra, India

Keywords:

Authentication, Mass Storage Device, USB.

Abstract

USB stands for universal serial bus, it is very famous and accepted as bridge for connecting different computer systems and its peripherals. Generally, user uses USB as MSD (Mass Storage Device) as it is very convenient and easily connects to computer system. As it is very easy to connect means it has more drawbacks. USB can get attacked by different attacks such as replay attack, password guessing attack, denial of services attack. And for saving from these attacks we are proposing new technique called as three factor security protocol. From the previous papers we have learnt different techniques. From the first paper wireless communication authentication scheme with anonymity have been analyzed. Also security errors with sensible cards within three user authentication scheme based on password is learnt from another paper. After that Li-Hwang’s has improved the user authentication scheme based on password and smart card. Jong-Hyouk Lee implemented work for HOTA (Handover Optimized Ticket Based Authentication) for enabling MN The implemented protocol is described with precise analysis of security with analysis of cost computation with practical. All this analysis explains importance of using USB-MSD to its users.

References

  1. Chia-Chun Wu, Wei-Bin Lee, Woei-JiunnTsaur, “A Secure Authentication Scheme with Anonymity for Wireless Communications”, IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008
  2. Kyung-Ah Shim, “Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards”, Cryptologia, 36:62–69, 2012 Copyright # Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611194.2011.606352
  3. Jong-Hyouk Lee, Jean-Marie Bonnin, “HOTA: Handover optimized ticket-based authentication in network-based mobility management”, Information Sciences 230 (2013) 64–77
  4. C-C Lee, C-T Chen, P-H Wu, T-Y Chen, “Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices”, IET Computer Digital Techniques 2013, Vol. 7 Iss 1, pp. 48–55 doi: 10.1049/iet-cdt.2012.0073
  5. A.K. Das, “Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards”, IET Information Security 2011 Vol 5, Iss 3, pp. 145–151 145 doi: 10.1049/iet-ifs.2010.0125
  6. Han-Cheng Hsiang a,b,*, Wei-Kuan Shih,” Weaknesses and improvements of the Yoon–Ryu–Yoo remote     user    authentication scheme using smart cards”, 2008 Published by Elsevier B.V. doi:10.1016/j.comcom.2008.11.019
  7. Dong-Ju Kim, Kwang-Woo Chung, and Kwang-SeokHong,“Person Authentication using Face, Teeth and Voice Modalities for Mobile Device Security”, Electronic version published 12/30/10.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Kirti Kamthe, Prtithviraj Chavan, Monika Jadhav, Kavita Phadatare, " Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.418-422, March-April-2017.