A strong user authentication scheme with smart cards for wireless communications

被引:151
作者
He, Daojing [1 ]
Ma, Maode [2 ]
Zhang, Yan [3 ,4 ]
Chen, Chun [1 ]
Bu, Jiajun [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou, Zhejiang, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
[3] Simula Res Lab, Oslo, Norway
[4] Univ Oslo, N-0316 Oslo, Norway
关键词
Authentication; Smart card; Security; Anonymity; Wireless networks; ANONYMITY; SECURITY; EFFICIENT;
D O I
10.1016/j.comcom.2010.02.031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Seamless roaming over wireless network is highly desirable to mobile users, and security such as authentication of mobile users is challenging. Recently, due to tamper-resistance and convenience in managing a password file, some smart card based secure authentication schemes have been proposed. This paper shows some security weaknesses in those schemes. As the main contribution of this paper, a secure and light-weight authentication scheme with user anonymity is presented. It is simple to implement for mobile user since it only performs a symmetric encryption/decryption operation. Having this feature, it is more suitable for the low-power and resource-limited mobile devices. In addition, it requires four message exchanges between mobile user, foreign agent and home agent. Thus, this protocol enjoys both computation and communication efficiency as compared to the well-known authentication schemes. As a special case, we consider the authentication protocol when a user is located in his/her home network. Also, the session key will be used only once between the mobile user and the visited network. Besides, security analysis demonstrates that our scheme enjoys important security attributes such as preventing the various kinds of attacks, single registration, user anonymity, no password/verifier table, and high efficiency in password authentication, etc. Moreover, one of the new features in our proposal is: it is secure in the case that the information stored in the smart card is disclosed but the user password of the smart card owner is unknown to the attacker. To the best of our knowledge, until now no user authentication scheme for wireless communications has been proposed to prevent from smart card breach. Finally, performance analysis shows that compared with known smart card based authentication protocols, our proposed scheme is more simple, secure and efficient. Crown Copyright (C) 2010 Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:367 / 374
页数:8
相关论文
共 17 条
[1]  
[Anonymous], 2004, GUIDE ELLIPTIC CURVE, DOI DOI 10.1007/B97644
[2]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[3]   Sizzle: A standards-based end-to-end security architecture for the embedded Internet [J].
Gupta, Vipul ;
Wurm, Michael ;
Zhu, Yu ;
Millard, Matthew ;
Fung, Stephen ;
Gura, Nils ;
Eberle, Hans ;
Shantz, Sheueling Chang .
PERVASIVE AND MOBILE COMPUTING, 2005, 1 (04) :425-445
[4]  
Hsiang H. C., 2009, COMPUTER STANDARDS I, V31
[5]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[6]   Security enhancement on a new authentication scheme with anonymity for wireless environments [J].
Lee, Cheng-Chi ;
Hwang, Min-Shiang ;
Liao, I-En .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (05) :1683-1687
[7]   Security Flaw of Authentication Scheme with Anonymity for Wireless Communications [J].
Lee, Ji-Seon ;
Chang, Jik Hyun ;
Lee, Dong Hoon .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (05) :292-293
[8]   A secure dynamic ID based remote user authentication scheme for multi-server environment [J].
Liao, Yi-Pin ;
Wang, Shuenn-Shyang .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) :24-29
[9]   Implementing public-key infrastructure for sensor networks [J].
Malan, David J. ;
Welsh, Matt ;
Smith, Michael D. .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (04)
[10]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552