A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design

被引:2
作者
Li, Xiong [1 ,2 ]
Liao, Junguo [1 ]
Kumari, Saru [3 ]
Liang, Wei [1 ]
Wu, Fan [4 ]
Khan, Muhammad Khurram [5 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250005, Uttar Pradesh, India
[4] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[5] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
User authentication; Key agreement; Dynamic ID; Anonymity; Cryptanalysis; SMART CARD; PASSWORD AUTHENTICATION; EFFICIENT; IMPROVEMENT; ANONYMITY; PROTOCOL;
D O I
10.1007/s11277-015-2737-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The remote user authentication scheme is an important security technology, which provides authentication service before a user accesses the service provided by the remote server. In this paper, we analyze the security and design flaws of a recently proposed dynamic ID authentication and key agreement scheme by Lin. We find Lin's scheme is totally cannot be used in real applications because of the following weaknesses: it has some design drawbacks such as it does not have the wrong password detection mechanism and its password change phase is incorrect; the user can login to the server using any wrong identity or password because of the inherent defects in the design of the authentication message; at the same time, Lin's scheme is vulnerable to the mobile device loss attack and denial of service attack. For security considerations, we propose some principles which should be followed in the design of the user authentication schemes. According to these design principles, we design a new dynamic ID-based user authentication scheme using mobile device. We formally analyze the security features of the proposed scheme using BAN logic, and give the provable security analysis in random oracle model. Besides, we also discuss our scheme can resist other well known attacks. The functionality and performance comparisons shown that the proposed scheme enhances the security features and keeps the efficiency at the same time.
引用
收藏
页码:263 / 288
页数:26
相关论文
共 38 条
[31]   New dynamic ID authentication scheme using smart cards [J].
Tsai, Jia-Lun ;
Wu, Tzong-Chen ;
Tsai, Kuo-Yu .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (12) :1449-1462
[32]   A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme [J].
Wang, Bin ;
Ma, Maode .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (02) :361-378
[33]   Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks [J].
Wang, Ding ;
Wang, Ping .
AD HOC NETWORKS, 2014, 20 :1-15
[34]   A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks [J].
Wen, Fengtong ;
Susilo, Willy ;
Yang, Guomin .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (03) :993-1004
[35]   An improved dynamic ID-based remote user authentication with key agreement scheme [J].
Wen, Fengtong ;
Li, Xuelei .
COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) :381-387
[36]   An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks [J].
Xu, Jing ;
Zhu, Wen-Tao ;
Feng, Deng-Guo .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :319-325
[37]   A user friendly authentication scheme with anonymity for wireless communications [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young ;
Ha, Keum-Sook .
COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) :356-364
[38]   Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young .
JOURNAL OF SUPERCOMPUTING, 2013, 63 (01) :235-255