An enhanced smart card and dynamic ID based remote multi-server user authentication scheme

被引:7
作者
Andola, Nitish [1 ]
Prakash, Sourabh [2 ]
Gahlot, Raghav [2 ]
Venkatesan, S. [2 ]
Verma, Shekhar [2 ]
机构
[1] Jaypee Inst Informat Technol, Comp Sci & Engn & Informat Technol, Noida, India
[2] Indian Inst Informat Technol Allahabad, Allahabad, Uttar Pradesh, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2022年 / 25卷 / 05期
关键词
Authentication; Access control; AVISPA; BAN logic; CUDA; Multi-server environment; Smart card; PASSWORD AUTHENTICATION; SECURITY;
D O I
10.1007/s10586-022-03585-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations often use smart card-based user authentication for remote access. The research community has put forward dynamic identity based remote user authentication schemes for distributed multi-server environment to safeguard the connection between user and server. Recently, Qiu et al. proposed an efficient smart card based remote user authentication scheme for the multi-server environment, in which they uphold their scheme provides mutual authentication and key agreement, user-anonymity, resistance against various kind of attacks. This paper will manifest that if the adversary is successful in stealing a smart card, then their schemes are vulnerable to masquerade attack, server spoofing attack, and password guessing attack. We overcome their flaws and propose an enhanced anonymous scheme where whenever the user wants to log into a server, the user identity is changed dynamically before login. And also, the scheme resists all possible attacks. We compared our scheme with respect to the related scheme, used BAN logic for verification of correctness of mutual key agreement and AVISPA to prove scheme is safe. We have provided formal security proofs for our scheme.
引用
收藏
页码:3699 / 3717
页数:19
相关论文
共 38 条
[1]  
Akherfi Khadija, 2018, Applied Computing and Informatics, V14, P1, DOI 10.1016/j.aci.2016.11.002
[2]  
Alamsyah Z., 2020, 2020 6 INT C COMPUTI, P15
[3]  
Alhejazi M.M., 2019, 2019 2 INT C COMPUTE, P110
[4]  
[Anonymous], 2018, INT J NETW SECUR
[5]  
BURROWS M, 1989, P R SOC LOND A
[6]  
Chaffetz J., 2016, The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation
[7]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[8]   Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update [J].
Chang, Ya-Fen ;
Tai, Wei-Liang ;
Chang, Hung-Chin .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) :3430-3440
[9]   Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing [J].
Derhab, Abdelouahid ;
Belaoued, Mohamed ;
Guerroumi, Mohamed ;
Khan, Farrukh Aslam .
IEEE ACCESS, 2020, 8 :28956-28969
[10]   Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues [J].
Ferrag, Mohamed Amine ;
Maglaras, Leandros ;
Derhab, Abdelouahid ;
Janicke, Helge .
TELECOMMUNICATION SYSTEMS, 2020, 73 (02) :317-348