A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement

被引:1
作者
Sahu, Ajay Kumar [1 ]
Kumar, Ashish [2 ]
机构
[1] Raj Kumar God Inst Technol & Management, Dept Comp Sci & Engn, Ghaziabad, Uttar Pradesh, India
[2] ITS, Dept Comp Sci & Engn, Greater Noida, Uttar Pradesh, India
来源
COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY | 2017年 / 5卷
关键词
Mutual authentication; Identity; Smart card; Security; Password; Session key; Un-traceability;
D O I
10.1007/978-981-10-3226-4_40
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To secure the data using smart card it is very essential to authenticate the user password and provide session key agreement over the unreliable networks. To check the authenticity or validity of the remote users, smart cards based on password authentication is the best mechanism to solve this problem. There are various password authentication mechanisms proposed by different researchers have its own merits and demerits. In this proposed scheme, a more efficient and secure untraceable remote user password authentication scheme using smart card with session key agreement, we compared other password authentication schemes based on smart card and found that the proposed scheme have various security features which are not present in other schemes. The various security features include as: (1) Verifier table is not required; (2) identity of the user can not be trace out; (3) smart card having inbuilt verification mechanism; (4) facility of mutual authentication on both sides user/server is present; (5) facility of session key between user/server is present; (6) provide quick wrong password detection; (7) provide secure password select/update facility; (8) provide forward secrecy; (9) the storage cost/operational cost/authentication cost are minimum; (10) privacy of the user can be protected; (11) timestamp at every phase of authentication is required; (12) in the situation of damage/misplace of smart card, server can reissue the same without altering the identity.
引用
收藏
页码:395 / 410
页数:16
相关论文
共 21 条
  • [1] Ahirwal D, 2012, INT J EMERGING TREND, V1
  • [2] [Anonymous], 2011, INT J NETW SECUR, DOI DOI 10.1007/S00607-013-0308-2
  • [3] Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
    Chang, Ya-Fen
    Tai, Wei-Liang
    Chang, Hung-Chin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 3430 - 3440
  • [4] Exploiting hash functions to intensify the remote user authentication scheme
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. COMPUTERS & SECURITY, 2012, 31 (06) : 791 - 798
  • [5] A simple remote user authentication scheme
    Hwang, MS
    Lee, CC
    Tang, YL
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) : 103 - 107
  • [6] A secure remote user mutual authentication scheme using smart cards
    Karuppiah, Marimuthu
    Saravanan, R.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (4-5) : 282 - 294
  • [7] Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    Khan, Muhammad Khurram
    Kim, Soo-Kyun
    Alghathbar, Khaled
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 305 - 309
  • [8] Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
  • [9] Kumar Dr.P., 2014, IJETAE, V4
  • [10] Lee YC, 2012, APPL MATH INFORM SCI, V6, p355S