An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments

被引:46
作者
Li, Chun-Ta [1 ]
Lee, Cheng-Chi [2 ,3 ]
Weng, Chi-Yao [4 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[3] Asia Univ, Dept Photon & Commun Engn, Taichung 41354, Taiwan
[4] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
关键词
Denial-of-Service (DoS) attack; Extended chaotic maps; Pervasive and ubiquitous computing; Remote user authentication; User anonymity; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; EFFICIENT; SECURITY; CRYPTANALYSIS;
D O I
10.1007/s11071-013-1029-y
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
As the era of pervasive and ubiquitous computing comes close, hand-held and smart devices are expected to achieve the dream of all time everywhere computing. Remote user authentication is important to verify the legitimacy of a login user over an insecure communication channel. Furthermore, in order to protect user privacy such that others cannot trace login users by eavesdropping the communication messages, several researchers proposed some dynamic ID-based remote user authentication schemes for providing user anonymity. On the other hand, the denial-of-service (DoS) attacks may make legal users unable to access a remote server by intercepting the authentication message which a login user sends to the remote server. It will make the latest user identities kept by login user and the remote server differ from each other. To ensure user anonymity and prevent such DoS attacks, we propose an extended chaotic map and dynamic ID-based user authentication scheme against DoS attacks. The proposed scheme is suitable for use in pervasive computing environments such as online financial authentication since it can ensure security while maintaining efficiency.
引用
收藏
页码:1133 / 1143
页数:11
相关论文
共 33 条
  • [1] Aaha D., 2003, COMPUTER, V36, P25
  • [2] [Anonymous], 2012, INT J NETW SECUR
  • [3] [Anonymous], 2002, FIPS, P180
  • [4] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [5] A dynamic ID-based remote user authentication scheme
    Das, ML
    Saxena, A
    Gulati, VP
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 629 - 631
  • [6] Chaotic map based key agreement with/out clock synchronization
    Han, S.
    Chang, E.
    [J]. CHAOS SOLITONS & FRACTALS, 2009, 39 (03) : 1283 - 1289
  • [7] Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    [J]. NONLINEAR DYNAMICS, 2012, 69 (03) : 1149 - 1157
  • [8] Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    [J]. CRYPTOLOGIA, 2010, 34 (01) : 52 - 59
  • [9] A new remote user authentication scheme using smart cards
    Hwang, MS
    Li, LH
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 28 - 30
  • [10] Robust and efficient password-authenticated key agreement using smart cards
    Juang, Wen-Shenq
    Chen, Sian-Teng
    Liaw, Horng-Twu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2008, 55 (06) : 2551 - 2556