An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments

被引:46
作者
Li, Chun-Ta [1 ]
Lee, Cheng-Chi [2 ,3 ]
Weng, Chi-Yao [4 ]
机构
[1] Tainan Univ Technol, Dept Informat Management, Tainan 71002, Taiwan
[2] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[3] Asia Univ, Dept Photon & Commun Engn, Taichung 41354, Taiwan
[4] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 30013, Taiwan
关键词
Denial-of-Service (DoS) attack; Extended chaotic maps; Pervasive and ubiquitous computing; Remote user authentication; User anonymity; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; EFFICIENT; SECURITY; CRYPTANALYSIS;
D O I
10.1007/s11071-013-1029-y
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
As the era of pervasive and ubiquitous computing comes close, hand-held and smart devices are expected to achieve the dream of all time everywhere computing. Remote user authentication is important to verify the legitimacy of a login user over an insecure communication channel. Furthermore, in order to protect user privacy such that others cannot trace login users by eavesdropping the communication messages, several researchers proposed some dynamic ID-based remote user authentication schemes for providing user anonymity. On the other hand, the denial-of-service (DoS) attacks may make legal users unable to access a remote server by intercepting the authentication message which a login user sends to the remote server. It will make the latest user identities kept by login user and the remote server differ from each other. To ensure user anonymity and prevent such DoS attacks, we propose an extended chaotic map and dynamic ID-based user authentication scheme against DoS attacks. The proposed scheme is suitable for use in pervasive computing environments such as online financial authentication since it can ensure security while maintaining efficiency.
引用
收藏
页码:1133 / 1143
页数:11
相关论文
共 33 条
  • [11] Kar Jayaprakash, 2013, International Journal of Network Security, V15, P357
  • [12] Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    Khan, Muhammad Khurram
    Kim, Soo-Kyun
    Alghathbar, Khaled
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 305 - 309
  • [13] More secure remote user authentication scheme
    Kim, Sang-Kyun
    Chung, Min Gyo
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (06) : 1018 - 1021
  • [14] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [15] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [16] PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION
    LAMPORT, L
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 770 - 772
  • [17] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
    Lee, Cheng-Chi
    Li, Chun-Ta
    Hsu, Che-Wei
    [J]. NONLINEAR DYNAMICS, 2013, 73 (1-2) : 125 - 132
  • [18] A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    Lee, Cheng-Chi
    Hsu, Che-Wei
    [J]. NONLINEAR DYNAMICS, 2013, 71 (1-2) : 201 - 211
  • [19] An extended chaotic maps-based key agreement protocol with user anonymity
    Lee, Cheng-Chi
    Chen, Chin-Ling
    Wu, Chia-Ying
    Huang, Shiow-Yuan
    [J]. NONLINEAR DYNAMICS, 2012, 69 (1-2) : 79 - 87
  • [20] A lack-of-fit test for parametric zero-inflated Poisson models
    Li, Chin-Shang
    [J]. JOURNAL OF STATISTICAL COMPUTATION AND SIMULATION, 2011, 81 (09) : 1081 - 1098