Title: A secure and efficient mobile ID framework for authentication with enhanced ECC

Authors: Kapil Kant Kamal; Sunil Gupta; Padmaja Joshi; Monit Kapoor

Addresses: Centre for Development of Advanced Computing (C-DAC), Maharashtra, 400049, India ' School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, 248007, India ' Centre for Development of Advanced Computing (C-DAC), Maharashtra, 400049, India ' Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, 140401, India

Abstract: The broad adoption of smartphones as a primary computing platform has led to their use for several real-life applications. Online payment transactions, location-based services, electronic governance, and online social media are a few of them. Such applications require access to various services through mobile applications, sharing sensitive information like authentication credentials, pictures, videos, personal data, etc. Therefore, the adoption of secure mobile identity management (IDM) is the need of the day. In this regard, we provide a scheme for identity authentication during online transactions. We first analyse the design requirements and propose a mobile ID authentication architecture by leveraging public-key infrastructure (PKI), enhanced elliptic curve cryptography (EECC), and token-based authentication. Finally, we use function verification and performance analysis to assess the suggested method for mobile identity authentication. By contrasting the proposed enhanced ECC with the current Rivest-Shamir-Adleman (RSA), AES, and ECC algorithms, the overall performance is examined. The experimental results show the viability of this proposal.

Keywords: mobile ID; authentication; cryptography; key management; network security.

DOI: 10.1504/IJSSE.2024.140733

International Journal of System of Systems Engineering, 2024 Vol.14 No.5, pp.461 - 479

Received: 03 Feb 2023
Accepted: 29 Mar 2023

Published online: 02 Sep 2024 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article