$w.onReady(function () { $w("#wixForms1").onWixFormSubmitted(() => { if (typeof ym === "function") { ym(106949707, "reachGoal", "demo_form_submit"); console.log("Metrica demo_form_submit sent"); } }); });
top of page
< Back

Mobile authentication secure against man-in-the-middle attacks

Authors:

Date published:

Journal:

Pages:

Publisher:

Abstract:

Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier

2014/1/1

Procedia Computer Science

34/323-329

Elsevier

Current mobile authentication solutions put a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the mobile device incorporates the context information of the connected service provider. Hence, upon receiving the signed message the Mobile-ID server could easily identify the existence of an on-going attack and notify the genuine service provider.

Download Paper

bottom of page