An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments

被引:0
|
作者
Chun-Ta Li
Cheng-Chi Lee
Chi-Yao Weng
机构
[1] Tainan University of Technology,Department of Information Management
[2] Fu Jen Catholic University,Department of Library and Information Science
[3] Asia University,Department of Photonics and Communication Engineering
[4] National Tsing Hua University,Department of Computer Science
来源
Nonlinear Dynamics | 2013年 / 74卷
关键词
Denial-of-Service (DoS) attack; Extended chaotic maps; Pervasive and ubiquitous computing; Remote user authentication; User anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
As the era of pervasive and ubiquitous computing comes close, hand-held and smart devices are expected to achieve the dream of all time everywhere computing. Remote user authentication is important to verify the legitimacy of a login user over an insecure communication channel. Furthermore, in order to protect user privacy such that others cannot trace login users by eavesdropping the communication messages, several researchers proposed some dynamic ID-based remote user authentication schemes for providing user anonymity. On the other hand, the denial-of-service (DoS) attacks may make legal users unable to access a remote server by intercepting the authentication message which a login user sends to the remote server. It will make the latest user identities kept by login user and the remote server differ from each other. To ensure user anonymity and prevent such DoS attacks, we propose an extended chaotic map and dynamic ID-based user authentication scheme against DoS attacks. The proposed scheme is suitable for use in pervasive computing environments such as online financial authentication since it can ensure security while maintaining efficiency.
引用
收藏
页码:1133 / 1143
页数:10
相关论文
共 13 条
  • [1] An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    NONLINEAR DYNAMICS, 2013, 74 (04) : 1133 - 1143
  • [2] Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    Jiang, Qi
    Wei, Fushan
    Fu, Shuai
    Ma, Jianfeng
    Li, Guangsong
    Alelaiwi, Abdulhameed
    NONLINEAR DYNAMICS, 2016, 83 (04) : 2085 - 2101
  • [3] A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
    Han, Lidong
    Xie, Qi
    Liu, Wenhao
    Wang, Shengbao
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 3391 - 3406
  • [4] A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
    Lidong Han
    Qi Xie
    Wenhao Liu
    Shengbao Wang
    Wireless Personal Communications, 2017, 95 : 3391 - 3406
  • [5] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [6] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [7] A secure chaotic maps-based privacy-protection scheme for multi-server environments
    Li, Chun-Ta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2276 - 2290
  • [8] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Journal of Medical Systems, 2014, 38
  • [9] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
  • [10] Cryptanalysis of a Privacy-Preserving and Provable User Authentication Scheme for Wireless Sensor Networks based on Internet of Things Security
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Song, Taeui
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 432 - 437