Breaking two remote user authentication systems for mobile devices

被引:3
|
作者
Li, Wenting [1 ]
Gu, Qianchen [2 ]
Zhao, Yiming [1 ]
Wang, Ping [1 ,3 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[3] Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
关键词
Smart-card-based user authentication; User anonymity; De-synchronization attack; User friendliness; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; SMART CARDS; SECURE; EFFICIENT; PROTOCOL; ANONYMITY; IDENTITY;
D O I
10.1109/BigDataSecurity.2017.34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart-card-based user authentication is a significant security mechanism that allows remote users to be granted access to services and resources in distributed computing environments like clouds. In this paper, we revisit two password authentication schemes with smart cards proposed by Mishra et al. and Wu et al. in 2015, respectively. We demonstrate that: (1) Despite being armed with a formal security proof in both schemes, Mishra et al.'s scheme actually cannot achieve the claimed feature of user anonymity and is vulnerable to insider attack; and (2) Wu et al.'s scheme remains being susceptible to de-synchronization attack as they stated to overcome the weaknesses of Kumar et al.'s scheme. Furthermore, with the cryptanalysis of these two schemes and our previous protocol design and analysis experience, we figure out two principles to design more robust smart-card-based user authentication schemes. The proposed principles would be helpful to protocol designers for proposing schemes with desirable user friendliness and security.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 50 条
  • [41] Trusted user authentication scheme combining password with fingerprint for mobile devices
    Zheng, Yu
    Xia, Jingchun
    He, Dake
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 63 - +
  • [42] Toward Secure User-Habit-Oriented Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1225 - 1231
  • [43] Multimodal Continuous User Authentication on Mobile Devices via Interaction Patterns
    Zhang, Xiaomei
    Zhang, Pengming
    Hu, Haomin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [44] Evaluation of feature values of surface electromyograms for user authentication on mobile devices
    Yamaba H.
    Kurogi A.
    Kubota S.-I.
    Katayama T.
    Park M.
    Okazaki N.
    Artificial Life and Robotics, 2017, 22 (1) : 108 - 112
  • [45] Outlier Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Essop, Ismael
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2778 - 2783
  • [46] Face-Based Multiple User Active Authentication on Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1240 - 1250
  • [47] Improving authentication of remote card transactions with mobile personal trusted devices
    Bottoni, Andrea
    Dini, Gianluca
    COMPUTER COMMUNICATIONS, 2007, 30 (08) : 1697 - 1712
  • [48] Remote Rendering and User Interaction on Mobile Devices for Scientific Visualization
    Krone, Michael
    Mueller, Christoph
    Ertl, Thomas
    8TH INTERNATIONAL SYMPOSIUM ON VISUAL INFORMATION COMMUNICATION AND INTERACTION (VINCI 2015), 2015, : 21 - 26
  • [49] Two-way Graphic Password for Mobile User Authentication
    Jiang, Ming
    He, Ai
    Wang, Kuangyu
    Le, Zhengyi
    2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 476 - 481
  • [50] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417