Remote user authentication scheme using smart card: a review

被引:15
作者
Karuppiah, Marimuthu [1 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
authentication; smart card; anonymity; security; offline password guessing attack; forward secrecy; remote user; impersonation attack; session key agreement; replay attack;
D O I
10.1504/IJIPT.2016.079548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is the process of verifying the legitimacy of a user. Until now, several authentication schemes using smart card proposed in the literature and each proposed scheme has its own merits and demerits. A common attribute among most of the proposed schemes is that the user identity is static in all the transaction sessions, which may reveal some facts about that user and can create threat of identity theft during the communication. In this paper, we have defined all the security requirements and all the goals an ideal remote user authentication scheme should satisfy and achieve. We have presented the results of our survey about remote user authentication schemes for client-server model. All the schemes are vulnerable to various attacks and do not meet the goals. In the future, we look forward to an ideal remote user authentication scheme, which meets all the security requirements and achieves all the goals can be developed. We should confidence that the attacks and goals we offer here can also aid future researchers develop better schemes.
引用
收藏
页码:107 / 120
页数:14
相关论文
共 98 条
[1]  
[Anonymous], INT J NETWORK SECURI
[2]   An improved timestamp-based remote user authentication scheme [J].
Awasthi, Amit K. ;
Srivastava, Keerti ;
Mittal, R. C. .
COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (06) :869-874
[3]   Cryptanalysis of a remote user authentication scheme using smart cards [J].
Chan, CK ;
Cheng, LM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :992-993
[4]  
Chan CK, 2002, COMPUT SECUR, V21, P74
[5]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P289
[6]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
LAIH, CS .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (04) :372-372
[7]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[8]   USING SMART CARDS TO AUTHENTICATE REMOTE PASSWORDS [J].
CHANG, CC ;
HWANG, SJ .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (07) :19-27
[9]   Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update [J].
Chang, Ya-Fen ;
Tai, Wei-Liang ;
Chang, Hung-Chin .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) :3430-3440
[10]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389