A Robust and Energy Efficient Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment

被引:0
作者
Sarvabhatla, Mrudula [1 ]
Murugan, Giri [2 ]
Vorugunti, Chandra Sekhar [3 ]
机构
[1] NBKRIST, Nellore, India
[2] SITAMS, CSE, Chitoor, AP, India
[3] ICT, Dhirubhai Ambani Inst, Gandhinagar, Gujarat, India
来源
2014 3RD INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS 2014) | 2014年
关键词
Energy Efficient; Green computing; Multi-Server; Cryptanalysis; User Authentication; Smart Card;
D O I
10.1109/Eco-friendly.2014.89
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the rapid development of wireless communication technologies, there is an exponential increase in usage of handheld devices to connect to remote servers. The advancement of communication technology also resulted in increasing number of security threats in public Internet. The resource (processing capacity, memory, battery) constraint nature of hand held devices is a serious bottle neck in implementing computing intensive cryptographic protocols. The current focus of research is to develop light weight authentication protocols. In 2014, Truong et al. proposed a Dynamic Id based remote user authentication scheme for multi-server environment. Truong et al. claimed that their scheme is secure against all major cryptographic attacks and satisfies all the multi-server environment security requirements. Unfortunately, their scheme is vulnerable to all major cryptographic attacks and requires high energy consumption as shown in this paper. As a part of our contribution, we propose a light weight and energy efficient authentication scheme for multi-server scenario that resists all major cryptographic attacks and reduces number of hash operations by 32% and energy consumption by 33%.
引用
收藏
页码:67 / 72
页数:6
相关论文
共 34 条
[1]  
[Anonymous], PERCOM 05 P 3 IEEE I
[2]   Elliptic curve cryptography based mutual authentication scheme for session initiation protocol [J].
Arshad, R. ;
Ikram, N. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) :165-178
[3]  
Awasthi A. K., 2004, T CRYPTOLOGY, V1, P15
[4]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[5]  
Carman D., 2000, CONSTRAINTS APPROACH
[6]  
Chaturvedi Ankita, 2013, Information Systems Security. 9th International Conference, ICISS 2013. Proceedings: LNCS 8303, P63, DOI 10.1007/978-3-642-45204-8_5
[7]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[8]  
Delgado-Mohatar O, 2010, LECT NOTES COMPUT SC, V6033, P332, DOI 10.1007/978-3-642-12368-9_27
[9]  
Hagras E. A. A. A., 2011, 28 NRSC
[10]  
Heinzelman W.R., 2000, 33 HAWAII INT C SYST