IMPROVED ID-BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD

被引:0
作者
Toan-Thinh Truong [1 ]
Minh-Triet Tran [1 ]
Anh-Duc Duong [2 ]
机构
[1] Univ Sci, VNU HCM, Ho Chi Minh City, Vietnam
[2] Univ Sci, VNU HCM, Ho Chi Minh City, Vietnam
来源
2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2013年
关键词
Authentication; Password; Dynamic ID; Smart card; Impersonation; Session key; Biometric-based; PASSWORD AUTHENTICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Because of non-stop applications' growth of network environment, making communications in such ambiance security is very important. Recently, Ashok Kumar Das has proposed a scheme to recover some pitfalls in Li et al.' s scheme. Das's protocol also utilizes biometrics and random value instead of time - stamp. Besides, storing temporary nonce to withstand replay attack is an inherited aspect of this scheme. However, in this paper, we show Das's scheme has many problems. To isolate them, we suggested a new design. Our scheme not only saves computational cost but also enhances security for transactions in insecure network channel.
引用
收藏
页码:1672 / 1677
页数:6
相关论文
共 14 条
[1]  
[Anonymous], 2011, INT J NETWORK SECURI
[2]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[3]  
Chen C. L., 2011, INT J COMMUNICATION
[4]  
Cheng-Chi Lee, 2002, Operating Systems Review, V36, P46, DOI 10.1145/567331.567335
[5]   A simple remote user authentication scheme [J].
Hwang, MS ;
Lee, CC ;
Tang, YL .
MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) :103-107
[6]   A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (11) :1892-1898
[7]   Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Wang, Xiaomin .
CHAOS SOLITONS & FRACTALS, 2008, 35 (03) :519-524
[8]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[9]  
Lee J. K., ELECT LETT, V38, P554
[10]   A lack-of-fit test for parametric zero-inflated Poisson models [J].
Li, Chin-Shang .
JOURNAL OF STATISTICAL COMPUTATION AND SIMULATION, 2011, 81 (09) :1081-1098