Breaking Three Remote user Authentication Systems for Mobile Devices

被引:5
|
作者
Li, Wenting [1 ]
Shen, Yaosheng [2 ]
Wang, Ping [1 ,3 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Shenzhen Grad Sch, Sch Elect & Comp Engn, Shenzhen 518052, Peoples R China
[3] Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
来源
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | 2018年 / 90卷 / 8-9期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Smart-card-based user authentication; User anonymity; De-synchronization attack; User friendliness; Impersonation attack; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; SMART CARDS; PASSWORD AUTHENTICATION; SECURE; EFFICIENT; ANONYMITY; PROTOCOL; IDENTITY;
D O I
10.1007/s11265-017-1305-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart-card-based user authentication is a significant security mechanism that allows remote users to be granted access to services and resources in distributed computing environments. In this paper, we review three password-based authentication schemes with smart cards proposed by Mishra et al., in JISA 2015, Wu et al. in SCN 2015 and Moon et al. in IJNS 2017, respectively. We demonstrate that: (1) Despite being armed with a formal security proof in all schemes, Mishra et al.'s scheme actually cannot achieve the claimed feature of user anonymity and is vulnerable to a new insider attack scenario; and (2) Wu et al.'s scheme remains being susceptible to de-synchronization attack as they stated to overcome the weaknesses of Kumar et al.'s scheme. (3) Moon et al.'s scheme cannot achieve user anonymity and is susceptible to a novel impersonation attack. Furthermore, with the cryptanalysis of these three schemes and our previous protocol design and analysis experience, we figure out two principles to design more robust smart-card-based user authentication schemes. The proposed principles would be helpful to protocol designers for proposing schemes with desirable user friendliness and security.
引用
收藏
页码:1179 / 1190
页数:12
相关论文
共 50 条
  • [1] Breaking Three Remote user Authentication Systems for Mobile Devices
    Wenting Li
    Yaosheng Shen
    Ping Wang
    Journal of Signal Processing Systems, 2018, 90 : 1179 - 1190
  • [2] Breaking two remote user authentication systems for mobile devices
    Li, Wenting
    Gu, Qianchen
    Zhao, Yiming
    Wang, Ping
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 37 - 42
  • [3] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [4] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [5] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [6] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [7] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [8] Using Mobile Devices for User Authentication
    Lach, Jacek
    COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [9] An Efficient Fingerprint-Based Remote User Authentication Protocol Using Mobile Devices
    Madhusudhan, R.
    Mittal, R. C.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 569 - 578
  • [10] Motion and audio analysis in mobile devices for remote monitoring of physical activities and user authentication
    Ketabdar, Hamed
    Qureshi, Jalaluddin
    Hui, Pan
    JOURNAL OF LOCATION BASED SERVICES, 2011, 5 (3-4) : 182 - 200