![]()
Certificate: View Certificate
Published Paper PDF: PDF
Esha Damle
Independent Researcher
India
Abstract
This manuscript presents the design and evaluation of secure authentication protocols tailored for client–server architectures prevalent in engineering systems up to 2014. The work surveys existing symmetric and asymmetric schemes, identifies their shortcomings in terms of computational overhead, replay resistance, and mutual authentication, and proposes two novel protocols that blend lightweight cryptographic primitives with timestamp and nonce mechanisms. Performance metrics, including authentication latency and computational cost, are derived analytically and validated through simulation. Case studies illustrate deployment in industrial control systems and remote monitoring applications. Results demonstrate that the proposed protocols achieve enhanced security—resistance to replay, man-in-the-middle, and impersonation attacks—while maintaining computational efficiency suitable for resource-constrained clients. Implementation guidelines ensure compatibility with legacy systems. This research contributes practicable solutions for engineering disciplines requiring robust, efficient authentication without reliance on post-2014 technologies.
Keywords
Secure authentication, client–server, nonce, timestamp, mutual authentication, replay attack, lightweight cryptography
References
Gong, L., & Syverson, P. (2010). Practical security analysis of authentication protocols. IEEE Transactions on Dependable and Secure Computing, 7(5), 486–499.
Bellare, M., & Rogaway, P. (2000). Entity authentication and key distribution. In Advances in Cryptology — CRYPTO 1993 (Vol. 773, pp. 232–249). Springer.
Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198–208.
Krawczyk, H. (1996). SIGMA: The `SIGn-and-MAc’ approach to authenticated Diffie-Hellman and its use in the IKE protocols. In Advances in Cryptology — CRYPTO ’03 (Vol. 2729, pp. 400–425). Springer.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
Rescorla, E. (2001). SSL and TLS: Designing and Building Secure Systems. Addison-Wesley.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptology — CRYPTO ’84 (Vol. 196, pp. 47–53). Springer.
Menezes, A., Vanstone, S., & Oorschot, P. V. (1997). Handbook of Applied Cryptography. CRC Press.
Stallings, W. (2011). Cryptography and Network Security: Principles and Practice (5th ed.). Pearson.
Saxena, A., & Chaudhuri, S. (2014). Lightweight authentication for wireless sensor networks: An energy-efficient protocol design. International Journal of Network Security, 16(3), 230–238.