Breaking two remote user authentication systems for mobile devices

被引:3
作者
Li, Wenting [1 ]
Gu, Qianchen [2 ]
Zhao, Yiming [1 ]
Wang, Ping [1 ,3 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[3] Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
来源
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2017年
关键词
Smart-card-based user authentication; User anonymity; De-synchronization attack; User friendliness; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; SMART CARDS; SECURE; EFFICIENT; PROTOCOL; ANONYMITY; IDENTITY;
D O I
10.1109/BigDataSecurity.2017.34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart-card-based user authentication is a significant security mechanism that allows remote users to be granted access to services and resources in distributed computing environments like clouds. In this paper, we revisit two password authentication schemes with smart cards proposed by Mishra et al. and Wu et al. in 2015, respectively. We demonstrate that: (1) Despite being armed with a formal security proof in both schemes, Mishra et al.'s scheme actually cannot achieve the claimed feature of user anonymity and is vulnerable to insider attack; and (2) Wu et al.'s scheme remains being susceptible to de-synchronization attack as they stated to overcome the weaknesses of Kumar et al.'s scheme. Furthermore, with the cryptanalysis of these two schemes and our previous protocol design and analysis experience, we figure out two principles to design more robust smart-card-based user authentication schemes. The proposed principles would be helpful to protocol designers for proposing schemes with desirable user friendliness and security.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 44 条
[1]   An Efficient Biometric Authentication Protocol for Wireless Sensor Networks [J].
Althobaiti, Ohood ;
Al-Rodhaan, Mznah ;
Al-Dhelaan, Abdullah .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[2]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62
[3]  
[Anonymous], 2010, P 3 ANN ACM BANG C C
[4]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[5]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[6]   A Robust Mutual Authentication Protocol for Wireless Sensor Networks [J].
Chen, Tien-Ho ;
Shih, Wei-Kuan .
ETRI JOURNAL, 2010, 32 (05) :704-712
[7]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[8]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[9]   An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment [J].
Farash, Mohammad Sabzinejad ;
Turkanovic, Muhamed ;
Kumari, Saru ;
Hoelbi, Marko .
AD HOC NETWORKS, 2016, 36 :152-176
[10]  
Florencio D., 2007, A Large-Scale Study of Web Password Habits