A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

被引:6
作者
Das, Ashok Kumar [1 ]
Odelu, Vanga [2 ]
Goswami, Adrijit [2 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[2] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
EFFICIENT; SCHEME; SECURITY;
D O I
10.1155/2014/719470
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
引用
收藏
页数:16
相关论文
共 30 条
[1]  
[Anonymous], 2011, INT J NETWORK SECURI
[2]  
[Anonymous], 1995, Secure Hash Standard
[3]  
Aumasson JP, 2010, LECT NOTES COMPUT SC, V6225, P1, DOI 10.1007/978-3-642-15031-9_1
[4]  
AVISPA, 2013, AVISPA WEB TOOL
[5]  
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[6]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[7]  
Das A. K., 2013, "Netw.Sci., V2, P12
[8]  
Das A. K., 2013, COMMUN COMPUT PHYS, V377, P236
[9]   A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS [J].
Das, Ashok Kumar ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 24 (05) :625-653
[10]   A novel proxy signature scheme based on user hierarchical access control policy [J].
Das, Ashok Kumar ;
Massand, Ashish ;
Patil, Sagar .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (02) :219-228