Breaking two remote user authentication systems for mobile devices

被引:3
|
作者
Li, Wenting [1 ]
Gu, Qianchen [2 ]
Zhao, Yiming [1 ]
Wang, Ping [1 ,3 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[3] Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
关键词
Smart-card-based user authentication; User anonymity; De-synchronization attack; User friendliness; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; SMART CARDS; SECURE; EFFICIENT; PROTOCOL; ANONYMITY; IDENTITY;
D O I
10.1109/BigDataSecurity.2017.34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart-card-based user authentication is a significant security mechanism that allows remote users to be granted access to services and resources in distributed computing environments like clouds. In this paper, we revisit two password authentication schemes with smart cards proposed by Mishra et al. and Wu et al. in 2015, respectively. We demonstrate that: (1) Despite being armed with a formal security proof in both schemes, Mishra et al.'s scheme actually cannot achieve the claimed feature of user anonymity and is vulnerable to insider attack; and (2) Wu et al.'s scheme remains being susceptible to de-synchronization attack as they stated to overcome the weaknesses of Kumar et al.'s scheme. Furthermore, with the cryptanalysis of these two schemes and our previous protocol design and analysis experience, we figure out two principles to design more robust smart-card-based user authentication schemes. The proposed principles would be helpful to protocol designers for proposing schemes with desirable user friendliness and security.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 50 条
  • [1] Breaking Three Remote user Authentication Systems for Mobile Devices
    Li, Wenting
    Shen, Yaosheng
    Wang, Ping
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2018, 90 (8-9): : 1179 - 1190
  • [2] Breaking Three Remote user Authentication Systems for Mobile Devices
    Wenting Li
    Yaosheng Shen
    Ping Wang
    Journal of Signal Processing Systems, 2018, 90 : 1179 - 1190
  • [3] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [4] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [5] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [6] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [7] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [8] Using Mobile Devices for User Authentication
    Lach, Jacek
    COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [9] An Efficient Fingerprint-Based Remote User Authentication Protocol Using Mobile Devices
    Madhusudhan, R.
    Mittal, R. C.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 569 - 578
  • [10] Motion and audio analysis in mobile devices for remote monitoring of physical activities and user authentication
    Ketabdar, Hamed
    Qureshi, Jalaluddin
    Hui, Pan
    JOURNAL OF LOCATION BASED SERVICES, 2011, 5 (3-4) : 182 - 200