An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures

被引:0
|
作者
Wen-Bin Hsieh
Jenq-Shiou Leu
机构
[1] National Taiwan University of Science and Technology,Department of Electronic Engineering
来源
关键词
User authentication; Pairing-based; Multi-server; Smart card;
D O I
暂无
中图分类号
学科分类号
摘要
As a smart phone becomes a daily necessity, mobile services are springing up. A mobile user should be authenticated and authorized before accessing these mobile services. Generally, mobile user authentication is a method which is used to validate the legitimacy of a mobile login user. As the rapid booming of computer networks, multi-server architecture has been pervasive in many network environments. Much recent research has been focused on proposing password-based remote user authentication protocols using smart cards for multi-server environments. To protect the privacy of users, many dynamic identity based remote user authentication protocols were proposed. In 2009, Hsiang and Shih claimed their protocol is efficient, secure, and suitable for the practical application environment. However, Sood et al. pointed out Hsiang et al.’s protocol is susceptible to replay attack, impersonation attack and stolen smart card attack. Moreover, the password change phase of Hsiang et al.’s protocol is incorrect. Thus, Sood et al. proposed an improved protocol claimed to be practical and computationally efficient. Nevertheless, Li et al. found that Sood et al.’s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack and consequently proposed an improvement to remove the aforementioned weaknesses. In 2012, Liao et al. proposed a novel pairing-based remote user authentication protocol for multi-server environment, the scheme based on elliptic curve cryptosystem is more secure and efficient. However, through careful analyses, we find that Liao et al.’s protocol is still susceptible to the trace attack. Besides, Liao et al.’s protocol is inefficient since each service server has to update its ID table periodically. In this paper, we propose an improved protocol to solve these weaknesses. By enhancing the security, the improved protocol is well suited for the practical environment.
引用
收藏
页码:133 / 148
页数:15
相关论文
共 50 条
  • [31] Towards generalized ID-based user authentication for mobile multi-server environment
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (04) : 447 - 460
  • [32] Efficient hierarchical multi-server authentication protocol for mobile cloud computing
    Kou J.
    He M.
    Xiong L.
    Ge Z.
    Xie G.
    He, Mingxing (he_mingxing64@aliyun.com), 1600, Tech Science Press (64): : 297 - 312
  • [33] Efficient Hierarchical Multi-Server Authentication Protocol for Mobile Cloud Computing
    Kou, Jiangheng
    He, Mingxing
    Xiong, Ling
    Ge, Zihang
    Xie, Guangmin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (01): : 297 - 312
  • [34] User authentication scheme based on self-certified public-key for next generation wireless network
    He, Dake
    Wang, Jianbo
    Zheng, Yu
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 33 - 40
  • [35] Distributed utility based User Authentication protocol for multi-server environment with key agreement utility
    Anand, Darpan
    Khemchandani, Vineeta
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 415 - 420
  • [36] Improvement of efficient proxy signature schemes using self-certified public keys
    Shao, ZH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 222 - 234
  • [37] A multi-server architecture authentication protocol using smart card
    Yu, Jie
    Pei, Qingqi
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 511 - 515
  • [38] One/T-time Signatures using Self-certified Public Keys
    Lin, Dai-Rui
    Wang, Chih-I
    Guan, D. J.
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 608 - 613
  • [39] Novel Multi-Server Authentication Protocol using Secret Sharing
    Nimmy, K.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA MINING AND ADVANCED COMPUTING (SAPIENCE), 2016, : 214 - 219
  • [40] A Threshold Multi-Server Protocol for Password-Based Authentication
    Guan, Mengxiang
    Song, Jiaxing
    Liu, Weidong
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 108 - 118