Advance remote user authentication scheme using smart card

被引:0
作者
Kumar S. [1 ]
Singh V. [1 ]
Sharma V. [1 ]
Singh V.P. [1 ]
机构
[1] Department of Computer Science and Engineering, Ajay Kumar Garg Engineering College, Ghaziabad, UP
来源
Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika) | 2019年 / 78卷 / 12期
关键词
Authentication; Password; Security; Smart card; Upgrading;
D O I
10.1615/telecomradeng.v78.i11.40
中图分类号
学科分类号
摘要
In 2016, Kaul and Awasthi proposed security enhancement of an improved remote user authentication scheme with key agreement and they proclaimed that their scheme ensures secure communication on an insecure channel and they also proposed that their scheme is secure against active and passive attacks. But in this paper, we demonstrate that their proposed scheme is completely insecure against malicious user attack, insider attack and also that an arbitrary user can easily reregister him, if he has certain parameters of Kaul et al. proposed scheme. Thus collapses the entire security of the system as well as user’s data and author claims are proven to be incorrect. Hence to cure the identified security flaws and to ensure the communication through an insecure channel, we proposed a better secure and efficient authentication protocol mechanism and also we have added some necessary phase required in authentication. © 2019 by Begell House, Inc.
引用
收藏
页码:957 / 971
页数:14
相关论文
共 15 条
[1]  
Li C.T., Hwang M.S., An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications, 33, 1, pp. 1-5, (2010)
[2]  
Liao I.E., Lee C.C., Hwang M.S., Security enhancement for a dynamic ID-based remote user authentication scheme, Next Generation Web Services Practices, NWeSP. International Conference, pp. 1-4, (2005)
[3]  
Yoon E.J., Ryu E.K., Yoo K.Y., Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, 50, 2, pp. 612-614, (2004)
[4]  
Wen F., Li X., An improved dynamic ID-based remote user authentication with key agreement scheme, Computers & Electrical Engineering, 38, 2, pp. 381-387, (2012)
[5]  
Wang Y.Y., Liu J.Y., Xiao F.X., Dan J., A more efficient and secure dynamic ID-based remote user authentication scheme, Computer Communications, 32, 4, pp. 583-585, (2009)
[6]  
Lamport L., Password authentication with insecure communication, Communications of the ACM, 24, 11, pp. 770-772, (1981)
[7]  
Chien H.Y., Chen C.H., A remote authentication scheme preserving user anonymity, Advanced Information Networking and Applications, AINA, 19th International Conference, 2, pp. 245-248, (2005)
[8]  
Das M.L., Saxena A., Gulati V.P., A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, 50, 2, pp. 629-631, (2004)
[9]  
He D., Wu S., Security flaws in a smart card based authentication scheme for multi-server environment, Wireless Personal Communications, 70, 1, pp. 323-329, (2013)
[10]  
Wang B., Ma M., A smart card based efficient and secured multi-server authentication scheme, Wireless Personal Communications, 68, 2, pp. 361-378, (2013)